From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Visual formalisms for configuration management.. CASCON, стр. 120-127. IBM, (1993)Clone detection by exploiting assembler., и . IWSC, стр. 77-78. ACM, (2010)Analyzing the Evolution of Large-Scale Software., , и . Journal of Software Maintenance, 16 (6): 363-365 (2004)Why provenance matters.. Perspectives on Data Science for Software Engineering, Academic Press, (2016)Connecting architecture reconstruction frameworks., , и . Inf. Softw. Technol., 42 (2): 91-102 (2000)Toward a taxonomy of clones in source code: A case study, и . Proc. Int'l Workshop on Evolution of Large Scale Industrial Software Architectures (ELISA), стр. 67--78. (2003)Proc. Int'l Workshop on Evolution of Large Scale Industrial Software Architectures (ELISA), , , и . vub-prog-tr-03-20. Programming Technology Lab, Vrije Universiteit Brussel, (2003)Studying the impact of risk assessment analytics on risk awareness and code review performance., , , и . Empir. Softw. Eng., 29 (2): 46 (апреля 2024)Sometimes, Cloning Is a Sound Design Decision!, и . Code Clone Analysis, Springer Singapore, (2021)Facilitating software evolution research with kenyon., , , и . ESEC/SIGSOFT FSE, стр. 177-186. ACM, (2005)