Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting fault-prone modules based on metrics transitions., , , and . DEFECTS, page 6-10. ACM, (2008)Constructing Dataset of Functionally Equivalent Java Methods Using Automated Test Generation Techniques., , , and . MSR, page 682-686. ACM, (2022)ClonePacker: A tool for clone set visualization., , and . SANER, page 474-478. IEEE Computer Society, (2015)Type-2 Code Clone Detection for Dockerfiles., , , , and . IWSC, page 1-7. IEEE, (2021)Generating simpler AST edit scripts by considering copy-and-paste., , and . ASE, page 532-542. IEEE Computer Society, (2017)Source code reuse evaluation by using real/potential copy and paste., , , , and . IWSC, page 33-39. IEEE Computer Society, (2015)On the level of code suggestion for reuse., , , and . IWSC, page 26-32. IEEE Computer Society, (2015)Folding Repeated Instructions for Improving Token-Based Code Clone Detection., , , , and . SCAM, page 64-73. IEEE Computer Society, (2012)Improving Process of Source Code Modification Focusing on Repeated Code., , , and . PROFES, volume 7983 of Lecture Notes in Computer Science, page 298-312. Springer, (2013)A visualization method of program dependency graph for identifying extract method opportunity., , and . WRT@ICSE, page 8-14. ACM, (2011)