Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining duplicate questions in stack overflow., , , and . MSR, page 402-412. ACM, (2016)Group awareness in distributed software development., , and . CSCW, page 72-81. ACM, (2004)An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques., , and . SCAM, page 62-73. IEEE, (2019)Future Challenges of Model-Based Design., , , , , , and . DSV-IS, volume 3941 of Lecture Notes in Computer Science, page 261. Springer, (2005)Blockchain Access Control Ecosystem for Big Data Security., , , and . iThings/GreenCom/CPSCom/SmartData, page 1373-1378. IEEE, (2018)Mining a Software Developer's Local Interaction History., , , and . MSR, page 106-110. (2004)Automatic Polyp Segmentation Using Convolutional Neural Networks., , , , and . Canadian AI, volume 12109 of Lecture Notes in Computer Science, page 290-301. Springer, (2020)Comparing Software Bugs in Clone and Non-clone Code: An Empirical Study, , , and . International Journal of Software Engineering and Knowledge Engineering, 27 (09n10): 1507?1527 (2017)An empirical study on clone stability, , and . ACM SIGAPP Applied Computing Review, 12 (3): 20?36 (2012)CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation, , , , and . 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), page 1026?1037. IEEE, (2019)