From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A large-scale longitudinal study of flaky tests., , , , , и . Proc. ACM Program. Lang., 4 (OOPSLA): 202:1-202:29 (2020)Internetware: A Software Paradigm for Internet Computing., , и . Computer, 45 (6): 26-31 (2012)Report on the international symposium on high confidence software (ISHCS 2011/2012)., , и . ACM SIGSOFT Softw. Eng. Notes, 38 (4): 27-33 (2013)JSidentify: a hybrid framework for detecting plagiarism among JavaScript code in online mini games., , , , , , , , , и 3 other автор(ы). ICSE (SEIP), стр. 211-220. ACM, (2020)Mining Likely Properties of Access Control Policies via Association Rule Mining., , , и . DBSec, том 6166 из Lecture Notes in Computer Science, стр. 193-208. Springer, (2010)A framework and tool supports for testing modularity of software design., , и . ASE, стр. 441-444. ACM, (2007)Random unit-test generation with MUT-aware sequence recommendation., , , и . ASE, стр. 293-296. ACM, (2010)Perspectives on automated testing of aspect-oriented programs., и . WTAOP@AOSD, стр. 7-12. ACM, (2007)Understanding software application interfaces via string analysis., и . ICSE, стр. 901-904. ACM, (2006)Performance debugging in the large via mining millions of stack traces., , , , и . ICSE, стр. 145-155. IEEE Computer Society, (2012)