Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Group awareness in distributed software development., , and . CSCW, page 72-81. ACM, (2004)Mining duplicate questions in stack overflow., , , and . MSR, page 402-412. ACM, (2016)Blockchain Access Control Ecosystem for Big Data Security., , , and . iThings/GreenCom/CPSCom/SmartData, page 1373-1378. IEEE, (2018)Future Challenges of Model-Based Design., , , , , , and . DSV-IS, volume 3941 of Lecture Notes in Computer Science, page 261. Springer, (2005)An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques., , and . SCAM, page 62-73. IEEE, (2019)Supporting Readability by Comprehending the Hierarchical Abstraction of a Software Project., , and . ISEC, page 13:1-13:10. ACM, (2022)Mining a Software Developer's Local Interaction History., , , and . MSR, page 106-110. (2004)Comparing Software Bugs in Clone and Non-clone Code: An Empirical Study, , , and . International Journal of Software Engineering and Knowledge Engineering, 27 (09n10): 1507?1527 (2017)An empirical study on clone stability, , and . ACM SIGAPP Applied Computing Review, 12 (3): 20?36 (2012)CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation, , , , and . 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), page 1026?1037. IEEE, (2019)