Author of the publication

How the Apache Community Upgrades Dependencies: An Evolutionary Study?

, , , , and . Empirical Software Engineering, 20 (5): 1275--1317 (October 2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables., , and . SECRYPT, page 462-467. SciTePress, (2017)Reasoning under Uncertainty in On-Line Auditing., and . Privacy in Statistical Databases, volume 5262 of Lecture Notes in Computer Science, page 257-269. Springer, (2008)A Bayesian Approach for On-Line Sum/Count/Max/Min Auditing on Boolean Data., and . Privacy in Statistical Databases, volume 7556 of Lecture Notes in Computer Science, page 295-307. Springer, (2012)An HMM and structural entropy based detector for Android malware: An empirical study., , and . Comput. Secur., (2016)A reverse engineering process for design level document production from ADA code., , and . Inf. Softw. Technol., 35 (1): 23-34 (1993)A family of experiments to validate metrics for software process models., , , , and . J. Syst. Softw., 77 (2): 113-129 (2005)Managing Trust in Social Networks., and . Inf. Secur. J. A Glob. Perspect., 21 (4): 206-215 (2012)Maintaining traceability links during object-oriented software evolution., , , and . Softw. Pract. Exp., 31 (4): 331-355 (2001)Investigando los beneficios de Pair Designing: un estudio empírico con profesionales., , , and . JISBD, page 489-494. (2006)A Design Rationale Based Environment for Cooperative Maintenance., , and . International Journal of Software Engineering and Knowledge Engineering, 10 (5): 627-645 (2000)