Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bootstrapping Dialog Models from Human to Human Conversation Logs., , , and . AAAI, page 16024-16025. AAAI Press, (2021)Detecting and Mitigating Secret-Key Leaks in Source Code Repositories., , , , and . MSR, page 396-400. IEEE Computer Society, (2015)AHA: Asset Harvester Assistant., , , , , , and . IEEE SCC, page 425-432. IEEE Computer Society, (2010)From Informal Process Diagrams to Formal Process Models., , , , and . BPM, volume 6336 of Lecture Notes in Computer Science, page 145-161. Springer, (2010)Doc2Bot: Document grounded Bot Framework., , , , , , , and . AAAI, page 16026-16028. AAAI Press, (2021)Consultant assistant: a tool for collaborative requirements gathering and business process documentation., , , , , , , , , and 3 other author(s). OOPSLA Companion, page 807-808. ACM, (2009)Toward the Development of Contextually Aware Business Applications via Model-Driven Transformations., , , , , , , and . ICWS, page 569-576. IEEE Computer Society, (2008)Debugging Model-Transformation Failures Using Dynamic Tainting., , , and . ECOOP, volume 6183 of Lecture Notes in Computer Science, page 26-51. Springer, (2010)Delta Refactoring for Merge Conflict Avoidance., , , and . ISEC, page 26-36. ACM, (2016)Distributed program tracing., , and . ESEC/SIGSOFT FSE, page 180-190. ACM, (2013)