Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REPENT: Analyzing the Nature of Identifier Renamings., , , , , and . IEEE Trans. Software Eng., 40 (5): 502-532 (2014)Prompter - Turning the IDE into a self-confident programming assistant., , , , and . Empirical Software Engineering, 21 (5): 2190-2231 (2016)Relationship between design patterns defects and crosscutting concern scattering degree: an empirical study., , and . IET Softw., 3 (5): 395-409 (2009)There and Back Again: Can you Compile that Snapshot?, , , , , , and . Journal of Software: Evolution and Process, 29 (4): e1838 (April 2017)The Evolution of Project Inter-Dependencies in a Software Ecosystem: the Case of Apache, , , , and . Proceedings of the 2013 IEEE International Conference on Software Maintenance, page 280--289. (September 2013)Guest editorial: Special section on mining software repositories., and . Empirical Software Engineering, 21 (2): 301-302 (2016)Assessing, Comparing, and Combining State Machine-Based Testing and Structural Testing: A Series of Experiments., , , and . IEEE Trans. Software Eng., 37 (2): 161-187 (2011)An Experimental Investigation of Formality in UML-Based Development., , , and . IEEE Trans. Software Eng., 31 (10): 833-849 (2005)An exploratory study of the evolution of software licensing., , , and . ICSE (1), page 145-154. ACM, (2010)Threats on building models from CVS and Bugzilla repositories: the Mozilla case study., , , and . CASCON, page 215-228. IBM, (2007)