From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Complete and accurate clone detection in graph-based models., , , , и . ICSE, стр. 276-286. IEEE, (2009)Detection of recurring software vulnerabilities., , , и . ASE, стр. 447-456. ACM, (2010)Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection., , , , и . FASE, том 5503 из Lecture Notes in Computer Science, стр. 440-455. Springer, (2009)ClemanX: Incremental clone detection tool for evolving software., , , , и . ICSE Companion, стр. 437-438. IEEE, (2009)Graph-based mining of multiple object usage patterns., , , , и . ESEC/SIGSOFT FSE, стр. 383-392. ACM, (2009)Cleman: Comprehensive Clone Group Evolution Management., , , , и . ASE, стр. 451-454. IEEE Computer Society, (2008)Detecting recurring and similar software vulnerabilities., , , , , и . ICSE (2), стр. 227-230. ACM, (2010)978-1-60558-719-6.Operation-Based, Fine-Grained Version Control Model for Tree-Based Representation., , , и . FASE, том 6013 из Lecture Notes in Computer Science, стр. 74-90. Springer, (2010)Recurring bug fixes in object-oriented programs., , , , и . ICSE (1), стр. 315-324. ACM, (2010)Clone-Aware Configuration Management., , , , и . ASE, стр. 123-134. IEEE Computer Society, (2009)