Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asynchronous Merging of Software Ontologies: An Experience., , , , and . JIISIC, page 99-106. Facultad de Ciencias e Ingeniería and Departamento de Ingeniería, Pontificia Universidad Católica del Perú, (2007)Taxonomia de Riscos para Manutenção de Software., , and . SBQS, page 43-57. SBC, (2005)Mining architectural violations from version history., , , , , and . Empir. Softw. Eng., 21 (3): 854-895 (2016)Modular Moose: A new generation software reverse engineering environment., , , , , , , , and . CoRR, (2020)Software Re-Documentation Process and Tool., , , , , and . CAiSE Short Paper Proceedings, volume 161 of CEUR Workshop Proceedings, CEUR-WS.org, (2005)Transformation-based Refactorings: a First Analysis., , , , and . IWST, volume 3325 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)Heuristics for discovering architectural violations., , , , and . WCRE, page 222-231. IEEE Computer Society, (2013)Developers' perception of co-change patterns: An empirical study., , , and . ICSME, page 21-30. IEEE Computer Society, (2015)System specific, source code transformations., , , , and . ICSME, page 221-230. IEEE Computer Society, (2015)Relational Database Schema Evolution: An Industrial Case Study., , , and . ICSME, page 635-644. IEEE Computer Society, (2018)