Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A modified dictionary-based method for data compression, , and . International Conference on Computer and Information Technology, page 66?71. (2001)A survey on software clone detection research, and . Queen?s School of Computing TR, 541 (115): 64?68 (2007)A framework for development and evaluation of a dynamic subchannel allocation scheme in an OFDMA system, , and . The Journal of Supercomputing, 47 (2): 198?227 (2009)RACK: Automatic API Recommendation Using Crowdsourced Knowledge., , and . SANER, page 349-359. IEEE Computer Society, (2016)RACK: code search in the IDE using crowdsourced knowledge., , and . ICSE (Companion Volume), page 51-54. IEEE Computer Society, (2017)Evaluating Aspect Mining Techniques: A Case Study., , , and . ICPC, page 167-176. IEEE Computer Society, (2007)Khulna-9208, Bangladesh** Department of Computer Science, University of Dhaka Dhaka-1000, Bangladesh, , , and . Proceedings, International Conference on Computer and Information Technology, December 28-29, 2001, 32, page 62. Department of Computer Science, University of Dhaka, (2001)CORRECT: code reviewer recommendation at GitHub for Vendasta technologies., , , and . ASE, page 792-797. ACM, (2016)Fast and flexible large-scale clone detection with CloneWorks., and . ICSE (Companion Volume), page 27-30. IEEE Computer Society, (2017)NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization., and . ICPC, page 172-181. IEEE Computer Society, (2008)