Author of the publication

A first look at duplicate and near-duplicate self-admitted technical debt comments.

, , and . ICPC, page 614-618. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population., , , , , , and . BMC Medical Imaging, (2012)Recommending Who to Follow in the Software Engineering Twitter Space., , , , and . ACM Trans. Softw. Eng. Methodol., 27 (4): 16:1-16:33 (2018)Observatory of trends in software related microblogs., , , , and . ASE, page 334-337. ACM, (2012)Convex Reconstruction of Structured Matrix Signals from Random Linear Measurements (I): Theoretical Results.. CoRR, (2019)Social Network and Tag Sources Based Augmenting Collaborative Recommender System., , , , , , and . IEICE Trans. Inf. Syst., 98-D (4): 902-910 (2015)Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds., , , and . CoRR, (2020)WebAPIRec: Recommending Web APIs to Software Projects via Personalized Ranking., , , and . IEEE Trans. Emerg. Top. Comput. Intell., 1 (3): 145-156 (2017)Sign Prediction on Unlabeled Social Networks Using Branch and Bound Optimized Transfer Learning., , , , , and . Complex., (2019)Natural disaster topic extraction in Sina microblogging based on graph analysis., , , , , and . Expert Syst. Appl., (2019)On the unreliability of bug severity data., , , and . Empirical Software Engineering, 21 (6): 2298-2323 (2016)