Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward a taxonomy of clones in source code: A case study, and . Proc. Int'l Workshop on Evolution of Large Scale Industrial Software Architectures (ELISA), page 67--78. (2003)Proc. Int'l Workshop on Evolution of Large Scale Industrial Software Architectures (ELISA), , , and . vub-prog-tr-03-20. Programming Technology Lab, Vrije Universiteit Brussel, (2003)Visual formalisms for configuration management.. CASCON, page 120-127. IBM, (1993)Clone detection by exploiting assembler., and . IWSC, page 77-78. ACM, (2010)Connecting architecture reconstruction frameworks., , and . Inf. Softw. Technol., 42 (2): 91-102 (2000)Facilitating software evolution research with kenyon., , , and . ESEC/SIGSOFT FSE, page 177-186. ACM, (2005)DocTer: documentation-guided fuzzing for testing deep learning API functions., , , , , , and . ISSTA, page 176-188. ACM, (2022)Storm prediction in a cloud., , , , , and . PESOS@ICSE, page 37-40. IEEE Computer Society, (2013)A Study of Cloning in the Linux SCSI Drivers., and . SCAM, page 95-104. IEEE Computer Society, (2011)Detecting API usage obstacles: a study of iOS and Android developer questions., and . MSR, page 61-64. IEEE Computer Society, (2013)