Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hey! are you committing tangled changes?, , , and . ICPC, page 262-265. ACM, (2014)Toward identifying inter-project clone sets for building useful libraries., , and . IWSC, page 87-88. ACM, (2010)A dataset of clone references with gaps., , and . MSR, page 412-415. ACM, (2014)Analysis of metrics for object-oriented program complexity., , , and . COMPSAC, page 201-207. IEEE, (1994)Localizing Multiple Faults in a Protocol Implementation., , , and . IEEE Des. Test Comput., 12 (3): 34-42 (1995)CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code., , and . IEEE Trans. Software Eng., 28 (7): 654-670 (2002)Ranking Significance of Software Components Based on Use Relations., , , , and . IEEE Trans. Software Eng., 31 (3): 213-225 (2005)A New Conformance Testing Technique for Localization of Multiple Faults in Communication Protocols., , , and . IEICE Trans. Inf. Syst., 78-D (7): 802-810 (1995)Refactoring Support Based on Code Clone Analysis., , , and . PROFES, volume 3009 of Lecture Notes in Computer Science, page 220-233. Springer, (2004)Call-Mark Slicing: An Efficient and Economical Way of Reducing Slice., , , and . ICSE, page 422-431. ACM, (1999)