From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Splitting Commits via Past Code Changes., , , и . APSEC, стр. 129-136. IEEE Computer Society, (2016)Global convergence of a class of non-interior point algorithms using Chen-Harker-Kanzow-Smale functions for nonlinear complementarity problems., и . Math. Program., 86 (1): 105-133 (1999)Experience Report: How Effective is Automated Program Repair for Industrial Software?, , , , и . SANER, стр. 612-616. IEEE, (2020)Gapped code clone detection with lightweight source code analysis., , , , и . ICPC, стр. 93-102. IEEE Computer Society, (2013)Folding Repeated Instructions for Improving Token-Based Code Clone Detection., , , , и . SCAM, стр. 64-73. IEEE Computer Society, (2012)Predicting Next Changes at the Fine-Grained Level., , , и . APSEC (1), стр. 119-126. IEEE Computer Society, (2014)Generating All Patterns of Graph Partitions Within a Disparity Bound., , , и . WALCOM, том 10167 из Lecture Notes in Computer Science, стр. 119-131. Springer, (2017)How Much Do Code Repositories Include Peripheral Modifications?, , , и . APSEC (2), стр. 19-24. IEEE Computer Society, (2013)Predicting Risky Clones Based on Machine Learning., , , и . PROFES, том 8892 из Lecture Notes in Computer Science, стр. 294-297. Springer, (2014)Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software., , , и . EVOL/IWPSE, стр. 73-82. ACM, (2010)