Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy set and cache-based approach for bug triaging., , , and . SIGSOFT FSE, page 365-375. ACM, (2011)Clone-Aware Configuration Management., , , , and . ASE, page 123-134. IEEE Computer Society, (2009)Recurring bug fixes in object-oriented programs., , , , and . ICSE (1), page 315-324. ACM, (2010)Scalable and incremental clone detection for evolving software., , , , and . ICSM, page 491-494. IEEE Computer Society, (2009)Fuzzy set-based automatic bug triaging., , , and . ICSE, page 884-887. ACM, (2011)Fuzzy set approach for automatic tagging in evolving software., , , , and . ICSM, page 1-10. IEEE Computer Society, (2010)Complete and accurate clone detection in graph-based models., , , , and . ICSE, page 276-286. IEEE, (2009)A topic-based approach for narrowing the search space of buggy files from a bug report., , , , and . ASE, page 263-272. IEEE Computer Society, (2011)Detecting semantic changes in Makefile build code., , , , and . ICSM, page 150-159. IEEE Computer Society, (2012)Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection., , , , and . FASE, volume 5503 of Lecture Notes in Computer Science, page 440-455. Springer, (2009)