Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependence Cluster Causes.. Scalable Program Analysis, volume 08161 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)Vocabulary normalization improves IR-based concept location., , and . ICSM, page 588-591. IEEE Computer Society, (2012)Task-Driven Software Summarization., , , , , , , , and . ICSM, page 432-435. IEEE Computer Society, (2013)Subclass Instantiation Distribution., and . SCAM, page 23-32. IEEE Computer Society, (2010)Assessing the Impact of Execution Environment on Observation-Based Slicing., and . SCAM, page 40-44. IEEE, (2022)Navigating source code with words., and . SCAM, page 71-80. IEEE Computer Society, (2015)Exploring the Effects of History Length and Age on Mining Software Change Impact., , , and . SCAM, page 207-216. IEEE Computer Society, (2016)On the Value of Bug Reports for Retrieval-Based Bug Localization., and . ICSME, page 524-528. IEEE Computer Society, (2018)From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively., , and . Computer, 54 (8): 77-85 (2021)An empirical evaluation of quasi-static executable slices., , and . J. Syst. Softw., (June 2023)