Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genealogical insights into the facts and fictions of clone removal, , , and . ACM SIGAPP Applied Computing Review, 13 (4): 30?42 (2013)On the Assessment of Security and Performance Bugs in Chromium Open-Source Project., , , , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 145-157. Springer, (2019)On the effectiveness of labeled latent dirichlet allocation in automatic bug-report categorization.. ICSE (Companion Volume), page 713-715. ACM, (2016)How bugs are fixed: exposing bug-fix patterns with edits and nesting levels., and . SAC, page 1523-1531. ACM, (2020)Towards understanding and exploiting developers' emotional variations in software engineering., and . SERA, page 185-192. IEEE Computer Society, (2016)Exploration and Exploitation of Developers' Sentimental Variations in Software Engineering., and . Int. J. Softw. Innov., 4 (4): 35-55 (2016)Detecting Web Spam in Webgraphs with Predictive Model Analysis., , , and . IEEE BigData, page 4299-4308. IEEE, (2019)Phishy? Detecting Phishing Emails Using ML and NLP., , and . SERA, page 77-83. IEEE, (2023)Plugins to Detect Vulnerable Plugins: An Empirical Assessment of the Security Scanner Plugins for WordPress., , and . SERA, page 39-44. IEEE, (2021)Towards Implementation of an Integrated Clone Management Infrastructure.. IWSC@SANER, page 60-61. IEEE Computer Society, (2016)