From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Bandit Algorithms for Selecting Feature Reduction Techniques in Software Defect Prediction., , , , , , , и . MSR, стр. 670-681. ACM, (2022)Code Clone Graph Metrics for Detecting Diffused Code Clones., , , , , и . APSEC, стр. 373-380. IEEE Computer Society, (2009)Proactive-Reactive Auto-Scaling Mechanism for Unpredictable Load Change., , и . IIAI-AAI, стр. 861-866. IEEE Computer Society, (2016)Probabilistic Position Estimation and Model Checking for Resource-Constrained IoT Devices., , , , и . ICCCN, стр. 1-7. IEEE, (2018)SHINOBI: A Tool for Automatic Code Clone Detection in the IDE., , , , , , и . WCRE, стр. 313-314. IEEE Computer Society, (2009)Fault Localization in Server-Side Applications Using Spectrum-Based Fault Localization., , и . SANER, стр. 1139-1146. IEEE, (2022)An Empirical Study of Fault Prediction with Code Clone Metrics., , , , , , , и . IWSM/Mensura, стр. 55-61. IEEE Computer Society, (2011)Investigating Tendencies in Callback Method Implementations in Android Applications., , и . IWESEP, стр. 23-28. IEEE Computer Society, (2017)Detecting functionally similar code within the same project., , и . IWSC, стр. 51-57. IEEE Computer Society, (2018)