From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The development of a partial design recovery environment for legacy systems., , , и . CASCON, стр. 206-216. IBM, (1993)Just-in-time detection of protection-impacting changes on WordPress and MediaWiki., , , , и . CASCON, стр. 178-188. ACM, (2018)Variable-precision reaching definitions analysis., , , и . Journal of Software Maintenance, 11 (2): 117-142 (1999)Detecting buffer overflow via automatic test input data generation., , , и . Comput. Oper. Res., 35 (10): 3125-3143 (2008)Unsupervised Graph Neural Networks for Source Code Similarity Detection., , , , и . DS, том 14276 из Lecture Notes in Computer Science, стр. 535-549. Springer, (2023)Detection of Plagiarism in University Projects Using Metrics-based Spectral Similarity.. Duplication, Redundancy, and Similarity in Software, том 06301 из Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2006)Feed-forward and recurrent neural networks for source code informal information analysis., , и . J. Softw. Maintenance Res. Pract., 15 (4): 205-244 (2003)Identification of out-of-distribution cases of CNN using class-based surprise adequacy., , , и . CAIN, стр. 39-40. ACM, (2022)Variable Precision Reaching Definitions Analysis for Software Maintenance., , , и . CSMR, стр. 60-67. IEEE Computer Society, (1997)Computing counter-examples for privilege protection losses using security models., и . SANER, стр. 240-249. IEEE Computer Society, (2017)