Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Targeted messages in indoor mobile environment: A software - oriented approach., , , and . IASTED Conf. on Software Engineering, page 734-739. IASTED/ACTA Press, (2004)Version Control, Part I.. IEEE Software, 22 (5): 107 (2005)Choosing a Programming Language.. IEEE Software, 23 (4): 62-63 (2006)Dismal Code: Studying the Evolution of Security Bugs., , , , and . LASER, page 37-48. USENIX Association, (2013)Effective Debugging: 66 Specific Ways to Debug Software and Systems. Effective Software Development Series Addison-Wesley, Boston, MA, (2016)Code smell detection by deep direct-learning and transfer-learning., , , and . J. Syst. Softw., (2021)Recruiting a Star Team.. IEEE Softw., 32 (3): 3-5 (2015)The Changing Role of the Software Architect.. IEEE Softw., 33 (6): 4-6 (2016)The Editor's Retrospective.. IEEE Softw., 35 (6): 4-7 (2018)State-of-the-Art Software Testing.. IEEE Softw., 34 (5): 4-6 (2017)