From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Can Fuzzy Mathematics enrich the Assessment of Software Maintainability?, , и . Software Audit and Metrics, стр. 85-94. INSTICC Press, (2004)Labeling Negative Examples in Supervised Learning of New Gene Regulatory Connections., , , и . CIBB, том 6685 из Lecture Notes in Computer Science, стр. 159-173. Springer, (2010)On the Use of Process Trails to Understand Software Development.. WCRE, стр. 303-304. IEEE Computer Society, (2006)The Evolution and Decay of Statically Detected Source Code Vulnerabilities., , и . SCAM, стр. 101-110. IEEE Computer Society, (2008)Identifying Changed Source Code Lines from Version Repositories., , и . MSR, стр. 14. IEEE Computer Society, (2007)Impact Analysis by Mining Software and Change Request Repositories., и . IEEE METRICS, стр. 29. IEEE Computer Society, (2005)Enhancing Online Discussion Forums with a Topic-driven Navigational Paradigm - A Plugin for the Moodle Learning Management System., , , и . KDIR, стр. 97-106. SciTePress, (2014)Social Interactions around Cross-System Bug Fixings: the Case of FreeBSD and OpenBSD, , , и . Proceedings of the 8th Working Conference on Mining Software Repositories, стр. 143--152. (мая 2011)The Life and Death of Statically Detected Vulnerabilities: an Empirical Study, , и . Information and Software Technology, 51 (10): 1469--1484 (октября 2009)An Empirical Study on the Maintenance of Source Code Clones, , , и . Empirical Software Engineering, 15 (1): 1--34 (февраля 2010)