Author of the publication

Recommending Code Reviewers for Proprietary Software Projects: A Large Scale Study.

, , , , , and . SANER, page 630-640. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Grid-Based Mobile Agent Platform by Instance-Oriented Delegation., and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 916-923. Springer, (2003)Load balance optimization with replication degree customization., , and . CCIS, page 170-174. IEEE, (2011)Exploring the Application of Blockchain Technology to Combat the Effects of Social Loafing in Cross Functional Group Projects., , , , , and . OpenSym, page 13:1-13:8. ACM, (2017)Information Credibility on Twitter in Emergency Situation., , , , and . PAISI, volume 7299 of Lecture Notes in Computer Science, page 45-59. Springer, (2012)Domain-specific cross-language relevant question retrieval., , , , , and . MSR, page 413-424. ACM, (2016)Experience report: An industrial experience report on test outsourcing practices., , , , , and . ISSRE, page 370-380. IEEE Computer Society, (2015)Automated Model-Based Performance Testing for PaaS Cloud Services., , and . COMPSAC Workshops, page 644-649. IEEE Computer Society, (2014)SATD detector: a text-mining-based self-admitted technical debt detection tool., , , , , and . ICSE (Companion Volume), page 9-12. ACM, (2018)On Reliability of Patch Correctness Assessment., , , , and . CoRR, (2018)Duplicate Pull Request Detection: When Time Matters., , , , and . Internetware, page 8:1-8:10. ACM, (2019)