Author of the publication

Analysis and Presentation of Recovered Software Architectures.

, , , and . WCRE, page 153-162. IEEE Computer Society, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Background and Overview for KDD Cup 2002 Task 1: Information Extraction from Biomedical Articles., , and . SIGKDD Explor., 4 (2): 87-89 (2002)Predicting the likely behaviours of continuous nonlinear systems in equilibrium.. UAI, page 383-396. North-Holland, (1988)Rutabaga by any other name: extracting biological names., , and . J. Biomed. Informatics, 35 (4): 247-259 (2002)Cognitive Assistance for Administrative Adjudication., , , , and . AAAI Fall Symposia, page 134-140. AAAI Press, (2017)Recognizers for Extracting Architectural Features from Source Code., , and . WCRE, IEEE Computer Society, (1995)Managing Recovered Function and Structure of Legacy Software Components., , , and . WCRE, page 79-88. IEEE Computer Society, (1998)Semi-Supervised Methods for Explainable Legal Prediction., , , , , , , and . ICAIL, page 22-31. ACM, (2019)Research Paper: Rapidly Retargetable Approaches to De-identification in Medical Records., , , , , , , , and . J. Am. Medical Informatics Assoc., 14 (5): 564-573 (2007)Evaluation of text data mining for database curation: lessons learned from the KDD Challenge Cup., , and . ISMB (Supplement of Bioinformatics), page 331-339. (2003)Learning Transformation Rules to Find Grammatical Relations., , and . CoNLL, page 43-52. ACL, (1999)