Author of the publication

A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis.

, and . Int. J. Adv. Comp. Techn., 2 (5): 1-12 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adopting IPsec to SIP Network for On-Demand VPN Establishment between Home Networks., , , , , and . GLOBECOM, page 5672-5676. IEEE, (2008)A proposal on Ad Hoc and Ubiquitous Communication Environment supported by Data-Driven Networking Processor., , and . PDPTA, page 587-590. CSREA Press, (2007)Concepts of Autonomous Contents Discovery Methods Based on Social Communities of Ad-Hoc Network Nodes Users., , , , and . PDPTA, page 591-595. CSREA Press, (2007)Analysis of Software Test Item Generation - Comparison Between High Skilled and Low Skilled Engineers., , and . J. Comput. Sci. Technol., 20 (2): 250-257 (2005)Proposed presence system for safety confirmation., , , , , and . ICIN, page 108-113. IEEE, (2012)Commit-Based Class-Level Defect Prediction for Python Projects., , , and . IEICE Trans. Inf. Syst., 106 (2): 157-165 (February 2023)Design of the mitigation information network in urban area., , , and . APNOMS, page 1-4. IEEE, (2012)Design of Information System in Disaster-robust Zero Energy Vehicle., , and . ICT-DM, page 1-8. IEEE, (2019)Analysis of a Code Review Tool Evolution: A Case Study of Rietveld to Gerrit., and . Int. J. Softw. Innov., 3 (1): 16-35 (2015)Classification of Bug Injected and Fixed Changes Using a Text Discriminator., and . Int. J. Softw. Innov., 3 (1): 50-62 (2015)