Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An incremental software architecture recovery technique driven by code changes., , , and . Frontiers Inf. Technol. Electron. Eng., 23 (5): 664-677 (2022)Are Smell-Based Metrics Actually Useful in Effort-Aware Structural Change-Proneness Prediction? An Empirical Study., , , , and . APSEC, page 315-324. IEEE, (2018)Recover and Optimize Software Architecture Based on Source Code and Directory Hierarchies (S)., , , and . SEKE, page 469-599. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)Identify MVC architectural pattern based on ontology., , and . SEKE, page 612-777. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)A BiLSTM-Attention Model for Detecting Smart Contract Defects More Accurately., , and . QRS, page 53-62. IEEE, (2022)WS-PSC Monitor: A Tool Chain for Monitoring Temporal and Timing Properties in Composite Service Based on Property Sequence Chart., , , , and . RV, volume 6418 of Lecture Notes in Computer Science, page 485-489. Springer, (2010)Evaluate How Cyclomatic Complexity Changes in the Context of Software Evolution., , , and . COMPSAC (2), page 756-761. IEEE Computer Society, (2018)978-1-5386-2667-2.CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge Graph., , , and . COMPSAC, page 699-704. IEEE, (2023)Change impact analysis and changeability assessment for a change proposal: An empirical study ☆☆., , , and . J. Syst. Softw., (2014)The impacts of techniques, programs and tests on automated program repair: An empirical study., , , and . J. Syst. Softw., (2018)