Author of the publication

How Much Do Code Repositories Include Peripheral Modifications?

, , , and . APSEC (2), page 19-24. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A metric-based approach to identifying refactoring opportunities for merging code clones in a Java software system., , and . Journal of Software Maintenance, 20 (6): 435-461 (2008)Localizing Multiple Faults in a Protocol Implementation., , , and . IEEE Des. Test Comput., 12 (3): 34-42 (1995)A New Conformance Testing Technique for Localization of Multiple Faults in Communication Protocols., , , and . IEICE Trans. Inf. Syst., 78-D (7): 802-810 (1995)Call-Mark Slicing: An Efficient and Economical Way of Reducing Slice., , , and . ICSE, page 422-431. ACM, (1999)Hey! are you committing tangled changes?, , , and . ICPC, page 262-265. ACM, (2014)Refactoring Support Based on Code Clone Analysis., , , and . PROFES, volume 3009 of Lecture Notes in Computer Science, page 220-233. Springer, (2004)Ranking Significance of Software Components Based on Use Relations., , , , and . IEEE Trans. Software Eng., 31 (3): 213-225 (2005)CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code., , and . IEEE Trans. Software Eng., 28 (7): 654-670 (2002)Toward Developer-like Automated Program Repair - Modification Comparisons between GenProg and Developers., , , and . APSEC, page 241-248. IEEE Computer Society, (2016)Analysis of metrics for object-oriented program complexity., , , and . COMPSAC, page 201-207. IEEE, (1994)