Author of the publication

Identification of behavioural and creational design motifs through dynamic analysis.

, , and . Journal of Software Maintenance, 22 (8): 597-627 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories., , and . ACM SIGSOFT Softw. Eng. Notes, 30 (4): 1-5 (2005)An Exploratory Study of Identifier Renamings, , , , , and . Proceedings of the 8th Working Conference on Mining Software Repositories, page 33--42. (May 2011)An empirical study on the importance of source code entities for requirements traceability., , , and . Empir. Softw. Eng., 20 (2): 442-478 (2015)An experimental investigation on the effects of context on source code identifiers splitting and expansion., , , and . Empir. Softw. Eng., 19 (6): 1706-1753 (2014)Requirements Traceability for Object Oriented Systems by Partitioning Source Code, , and . 18th Working Conf. on Reverse Engineering, page 45--54. IEEE Computer Society, (October 2011)Noise in Mylyn interaction traces and its impact on developers and recommendation systems., , , and . Empirical Software Engineering, 23 (2): 645-692 (2018)Improving network applications security: a new heuristic to generate stress testing data., , , , and . GECCO, page 1037-1043. ACM, (2005)AURA: a hybrid approach to identify framework evolution., , , and . ICSE (1), page 325-334. ACM, (2010)On feature traceability in object oriented programs., , , and . TEFSE@ASE, page 73-78. ACM, (2005)Adapting Function Points to Object-Oriented Information Systems., , , , and . CAiSE, volume 1413 of Lecture Notes in Computer Science, page 59-76. Springer, (1998)