Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Online Discussion Forums with a Topic-driven Navigational Paradigm - A Plugin for the Moodle Learning Management System., , , and . KDIR, page 97-106. SciTePress, (2014)Impact Analysis by Mining Software and Change Request Repositories., and . IEEE METRICS, page 29. IEEE Computer Society, (2005)Labeling Negative Examples in Supervised Learning of New Gene Regulatory Connections., , , and . CIBB, volume 6685 of Lecture Notes in Computer Science, page 159-173. Springer, (2010)Can Fuzzy Mathematics enrich the Assessment of Software Maintainability?, , and . Software Audit and Metrics, page 85-94. INSTICC Press, (2004)On the Use of Process Trails to Understand Software Development.. WCRE, page 303-304. IEEE Computer Society, (2006)The Evolution and Decay of Statically Detected Source Code Vulnerabilities., , and . SCAM, page 101-110. IEEE Computer Society, (2008)Identifying Changed Source Code Lines from Version Repositories., , and . MSR, page 14. IEEE Computer Society, (2007)Social Interactions around Cross-System Bug Fixings: the Case of FreeBSD and OpenBSD, , , and . Proceedings of the 8th Working Conference on Mining Software Repositories, page 143--152. (May 2011)The Life and Death of Statically Detected Vulnerabilities: an Empirical Study, , and . Information and Software Technology, 51 (10): 1469--1484 (October 2009)An Empirical Study on the Maintenance of Source Code Clones, , , and . Empirical Software Engineering, 15 (1): 1--34 (February 2010)