Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and design of the firewall penetration technology serving to distributed cloud resource., , and . Internetware, page 16:1-16:4. ACM, (2013)F007: finding rediscovered faults from the field using function-level failed traces of software in the field., , , and . CASCON, page 57-71. ACM, (2010)Diagnosing new faults using mutants and prior faults., , , and . ICSE, page 960-963. ACM, (2011)Does Requirements Clustering Lead to Modular Design?., , , and . REFSQ, volume 5512 of Lecture Notes in Computer Science, page 233-239. Springer, (2009)An Approach to Requirements Encapsulation with Clustering., , and . WER, page 92-96. (2007)Service retrieval based on hybrid SLVM of WSDL., , , and . Internetware, page 120-126. ACM, (2014)Lexical-semantic SLVM for XML Document Classification., , , , , and . J. Softw., 9 (12): 3028-3034 (2014)Does the Role Matter? An Investigation of the Code Quality of Casual Contributors in GitHub., , , , , and . APSEC, page 49-56. IEEE Computer Society, (2016)A Case Study of Measuring Degeneration of Software Architectures from a Defect Perspective., and . APSEC, page 242-249. IEEE Computer Society, (2011)Continuous inspection in the classroom: improving students' programming quality with social coding methods., , , , , and . ICSE (Companion Volume), page 141-142. ACM, (2018)