Author of the publication

How the Training Procedure Impacts the Performance of Deep Learning-based Vulnerability Patching.

, , , and . EASE, page 150-159. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threats on building models from CVS and Bugzilla repositories: the Mozilla case study., , , and . CASCON, page 215-228. IBM, (2007)Identifying and locating interference issues in PHP applications: the case of WordPress., , , and . ICPC, page 157-167. ACM, (2014)Mining StackOverflow to turn the IDE into a self-confident programming prompter., , , , and . MSR, page 102-111. ACM, (2014)An exploratory study of the evolution of software licensing., , , and . ICSE (1), page 145-154. ACM, (2010)TRIS: A Fast and Accurate Identifiers Splitting and Expansion Algorithm, , , , and . Proc. of the 19th Working Conference on Reverse Engineering, page 103 -112. IEEE, (October 2012)An exploratory study of the impact of antipatterns on class change- and fault-proneness., , , and . Empirical Software Engineering, 17 (3): 243-275 (2012)An empirical study on the evolution of design patterns., , , , and . ESEC/SIGSOFT FSE, page 385-394. ACM, (2007)Detecting missing information in bug descriptions., , , , , , , and . ESEC/SIGSOFT FSE, page 396-407. ACM, (2017)Enabling mutation testing for Android apps., , , , , , , and . ESEC/SIGSOFT FSE, page 233-244. ACM, (2017)Special issue on source code analysis and manipulation (SCAM 2006)., and . J. Softw. Maintenance Res. Pract., 19 (4): 203-204 (2007)