Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ragkhitwetsagul, Chaiyong
add a person with the name Ragkhitwetsagul, Chaiyong
 

Other publications of authors with the same name

How Do Contributors Impact Code Naturalness? An Exploratory Study of 50 Python Projects., , , , , , , and . IWESEP, page 7-12. IEEE, (2019)Automatically recommending components for issue reports using deep learning., , , , , and . Empir. Softw. Eng., 26 (1): 14 (2021)Teddy: Automatic Recommendation of Pythonic Idiom Usage For Pull-Based Software Projects., , , , , , and . ICSME, page 806-809. IEEE, (2020)Measuring Code Similarity in Large-Scaled Code Corpora.. ICSME, page 626-630. IEEE Computer Society, (2016)Automatic Classifying Self-Admitted Technical Debt Using N-Gram IDF., , , , , , , and . APSEC, page 316-322. IEEE, (2019)FixMe: A GitHub Bot for Detecting and Monitoring On-Hold Self-Admitted Technical Debt., , , , , , , , and . ASE, page 1257-1261. IEEE, (2021)V-Achilles: An Interactive Visualization of Transitive Security Vulnerabilities., , , , , , , , , and . ASE, page 169:1-169:4. ACM, (2022)Visualizing the Usage of Pythonic Idioms Over Time: A Case Study of the with open Idiom., , , , , , , and . IWESEP, page 43-48. IEEE, (2019)Detecting Malicious Android Game Applications on Third-Party Stores Using Machine Learning., , and . AINA (4), volume 202 of Lecture Notes on Data Engineering and Communications Technologies, page 238-251. Springer, (2024)Identifying Software Engineering Challenges in Software SMEs: A Case Study in Thailand., , , , and . SANER, page 218-222. IEEE, (2022)