Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A review and comparison of methods for determining the best analogies in analogy-based software effort estimation., , , , , , and . SAC, page 1554-1557. ACM, (2016)Does coding in Pythonic zen peak performance?: preliminary experiments of nine Pythonic idioms at scale., , , , , and . ICPC, page 575-579. ACM, (2022)V-Achilles: An Interactive Visualization of Transitive Security Vulnerabilities., , , , , , , , , and . ASE, page 169:1-169:4. ACM, (2022)Towards Smoother Library Migrations: A Look at Vulnerable Dependency Migrations at Function Level for npm JavaScript Packages., , , , , and . ICSME, page 559-563. IEEE Computer Society, (2018)Contrasting Third-Party Package Management User Experience., , , , , and . ICSME, page 664-668. IEEE, (2021)Lags in the release, adoption, and propagation of npm vulnerability fixes., , , , , and . Empir. Softw. Eng., 26 (3): 47 (2021)Graph Clustering-Based Emerging Event Detection from Twitter Data Stream., , and . ICNCC, page 37-41. ACM, (2016)An Empirical Evaluation of Competitive Programming AI: A Case Study of AlphaCode., , , , , , , and . IWSC, page 10-15. IEEE, (2022)GitHub Repositories with Links to Academic Papers: Open Access, Traceability, and Evolution., , , , , , and . CoRR, (2020)SōjiTantei: Function-Call Reachability Detection of Vulnerable Code for npm Packages., , , , , and . IEICE Trans. Inf. Syst., 105-D (1): 19-20 (2022)