Author of the publication

Recruiting from the Network: Discovering Twitter Users Who Can Help Combat Zika Epidemics.

, , , , , , , and . ICWE, volume 10360 of Lecture Notes in Computer Science, page 437-445. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Taming Agents and Objects in Software Engineering., , , , , and . SELMAS, volume 2603 of Lecture Notes in Computer Science, page 1-26. Springer, (2002)Aspect-Oriented Software Development Beyond Programming., , and . ICSR, volume 4039 of Lecture Notes in Computer Science, page 441-442. Springer, (2006)A Systematic Approach for Including Machine Learning in Multi-agent Systems., , , and . AOIS, volume 3508 of Lecture Notes in Computer Science, page 198-211. Springer, (2004)An Aspect-Based Approach for Developing Multi-Agent Object-Oriented Systems., , , and . SBES, page 177-192. SBC, (2001)Do Critical Components Smell Bad? An Empirical Study with Component-based Software Product Lines., , and . SBCARS, page 21-30. ACM, (2021)The untold story of code refactoring customizations in practice., , , , , , and . ICSE, page 108-120. IEEE, (2023)Predicting Design Impactful Changes in Modern Code Review: A Large-Scale Empirical Study., , , , , , , , and . MSR, page 471-482. IEEE, (2021)Extending UML Components to Develop Software Product-Line Architectures: Lessons Learned., , , , , , , and . ECSA, volume 6903 of Lecture Notes in Computer Science, page 130-138. Springer, (2011)Architecture-sensitive heuristics for prioritizing critical code anomalies., , and . MODULARITY, page 68-80. ACM, (2015)Experience report: Can software testing education lead to more reliable code?, , , and . ISSRE, page 359-369. IEEE Computer Society, (2015)