Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Noise in Mylyn interaction traces and its impact on developers and recommendation systems., , , and . Empirical Software Engineering, 23 (2): 645-692 (2018)Analyzing cloning evolution in the Linux kernel., , , and . Inf. Softw. Technol., 44 (13): 755-765 (2002)Language modelling for efficient beam-search., , , and . Comput. Speech Lang., 9 (4): 353-379 (1995)Improving network applications security: a new heuristic to generate stress testing data., , , , and . GECCO, page 1037-1043. ACM, (2005)On feature traceability in object oriented programs., , , and . TEFSE@ASE, page 73-78. ACM, (2005)Automatic mutation test input data generation via ant colony., , and . GECCO, page 1074-1081. ACM, (2007)AURA: a hybrid approach to identify framework evolution., , , and . ICSE (1), page 325-334. ACM, (2010)Adapting Function Points to Object-Oriented Information Systems., , , , and . CAiSE, volume 1413 of Lecture Notes in Computer Science, page 59-76. Springer, (1998)Identification of behavioural and creational design motifs through dynamic analysis., , and . Journal of Software Maintenance, 22 (8): 597-627 (2010)Requirements Traceability for Object Oriented Systems by Partitioning Source Code, , and . 18th Working Conf. on Reverse Engineering, page 45--54. IEEE Computer Society, (October 2011)