Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effects of Education on Students' Perception of Modeling in Software Engineering., , , , , and . HuFaMo@MoDELS, volume 1522 of CEUR Workshop Proceedings, page 39-46. CEUR-WS.org, (2015)Automatic prediction of the severity of bugs using stack traces and categorical features., , and . Inf. Softw. Technol., (2020)Towards a formal framework for evaluating the effectiveness of system diversity when applied to security., , and . CISDA, page 1-7. IEEE, (2012)Software Clustering Using Dynamic Analysis and Static Dependencies., , and . CSMR, page 27-36. IEEE Computer Society, (2009)Towards Quality-Driven SOA Systems Refactoring Through Planning., , , , and . MCETECH, volume 209 of Lecture Notes in Business Information Processing, page 269-284. Springer, (2015)Execution Traces: A New Domain That Requires the Creation of a Standard Metamodel., and . FGIT-ASEA, volume 59 of Communications in Computer and Information Science, page 253-263. Springer, (2009)Predicting bug report fields using stack traces and categorical attributes., , , and . CASCON, page 224-233. ACM, (2019)An improved Hidden Markov Model for anomaly detection using frequent common patterns., , and . ICC, page 1113-1117. IEEE, (2012)DURFEX: A Feature Extraction Technique for Efficient Detection of Duplicate Bug Reports., , and . QRS, page 240-250. IEEE, (2017)An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques., , and . QRS, page 109-118. IEEE, (2015)