Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive approach with active learning in software fault prediction., and . PROMISE, page 79-88. ACM, (2012)Performance and Risk Analysis for Border Management Applications: A Model-Driven Approach and a Perspective View., , and . EISIC, page 350-352. IEEE Computer Society, (2012)Can NMT Understand Me? Towards Perturbation-based Evaluation of NMT Models for Code Generation., , , , , and . NLBSE, page 59-66. ACM/IEEE, (2022)Decision dependability and its application to identity management., , and . CSIIRW, page 68. ACM, (2009)A Strategy for Verification of Decomposable SCR Models., and . PRDC, page 11-18. IEEE Computer Society, (2006)Performability Modeling of Mobile Software Systems., , and . ISSRE, page 77-88. IEEE Computer Society, (2004)Validation and Reliability Estimation of a Fingerprint Image Registration Software., , , , and . ISSRE, page 306-313. IEEE Computer Society, (2004)Automating Techniques for Inspecting High Assurance Systems., and . HASE, page 117-126. IEEE Computer Society, (2001)Eclipse vs. Mozilla: A Comparison of Two Large-Scale Open Source Problem Report Repositories., , , and . HASE, page 263-270. IEEE Computer Society, (2015)Automated Duplicate Bug Report Classification Using Subsequence Matching., , and . HASE, page 74-81. IEEE Computer Society, (2012)