From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting and Mitigating Secret-Key Leaks in Source Code Repositories., , , , и . MSR, стр. 396-400. IEEE Computer Society, (2015)AHA: Asset Harvester Assistant., , , , , , и . IEEE SCC, стр. 425-432. IEEE Computer Society, (2010)Bootstrapping Dialog Models from Human to Human Conversation Logs., , , и . AAAI, стр. 16024-16025. AAAI Press, (2021)From Informal Process Diagrams to Formal Process Models., , , , и . BPM, том 6336 из Lecture Notes in Computer Science, стр. 145-161. Springer, (2010)Consultant assistant: a tool for collaborative requirements gathering and business process documentation., , , , , , , , , и 3 other автор(ы). OOPSLA Companion, стр. 807-808. ACM, (2009)Doc2Bot: Document grounded Bot Framework., , , , , , , и . AAAI, стр. 16026-16028. AAAI Press, (2021)Toward the Development of Contextually Aware Business Applications via Model-Driven Transformations., , , , , , , и . ICWS, стр. 569-576. IEEE Computer Society, (2008)A Model Driven Framework for IT Transformation., , , и . BDIM, стр. 55-64. IEEE, (2007)Using MATCON to generate CASE tools that guide deployment of pre-packaged applications., , , , , , , , , и 4 other автор(ы). ICSE, стр. 1016-1018. ACM, (2011)Fault localization for data-centric programs., , , , , и . SIGSOFT FSE, стр. 157-167. ACM, (2011)