Author of the publication

Processing Software Source Text in Automated Design Recovery and Transformation.

, , , , , and . IWPC, page 127-134. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain Access Control Ecosystem for Big Data Security., , , and . iThings/GreenCom/CPSCom/SmartData, page 1373-1378. IEEE, (2018)Future Challenges of Model-Based Design., , , , , , and . DSV-IS, volume 3941 of Lecture Notes in Computer Science, page 261. Springer, (2005)Mining a Software Developer's Local Interaction History., , , and . MSR, page 106-110. (2004)Comparing Software Bugs in Clone and Non-clone Code: An Empirical Study, , , and . International Journal of Software Engineering and Knowledge Engineering, 27 (09n10): 1507?1527 (2017)Mining duplicate questions of stack overflow, , , and . 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR), page 402?412. IEEE, (2016)An empirical study on clone stability, , and . ACM SIGAPP Applied Computing Review, 12 (3): 20?36 (2012)CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation, , , , and . 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), page 1026?1037. IEEE, (2019)How developers use exception handling in Java?, , , and . 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR), page 516?519. IEEE, (2016)Bug-proneness and late propagation tendency of code clones: A comparative study on different clone types, , and . Journal of Systems and Software, (2018)A Simple, Efficient, Context-sensitive Approach for Code Completion, , , and . Journal of Software: Evolution and Process, 28 (7): 512?541 (2016)