Author of the publication

Identifying Code Changes for Architecture Decay via a Metric Forest Structure.

, , , , , and . TechDebt@ICSE, page 62-71. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis., , , , , , , , and . ACM Trans. Softw. Eng. Methodol., 32 (4): 87:1-87:26 (July 2023)BDMMT: Backdoor Sample Detection for Language Models through Model Mutation Testing., , , , and . CoRR, (2023)Where to Start: Studying Type Annotation Practices in Python., , , , and . ASE, page 529-541. IEEE, (2021)Comparing One with Many - Solving Binary2source Function Matching Under Function Inlining., , , , , , , , and . CoRR, (2022)Relation-based test case prioritization for regression testing., , , , , , and . J. Syst. Softw., (2020)One-to-One or One-to-many? What function inlining brings to binary2source similarity analysis., , , , and . CoRR, (2021)Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization., , , , , , , and . ICSE, page 1674-1686. IEEE, (2023)Service Candidate Identification from Monolithic Systems Based on Execution Traces., , , , , and . IEEE Trans. Software Eng., 47 (5): 987-1007 (2021)BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Exploring the Architectural Impact of Possible Dependencies in Python Software., , , , , and . ASE, page 758-770. IEEE, (2020)