From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic prediction of the severity of bugs using stack traces and categorical features., , и . Inf. Softw. Technol., (2020)DURFEX: A Feature Extraction Technique for Efficient Detection of Duplicate Bug Reports., , и . QRS, стр. 240-250. IEEE, (2017)An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques., , и . QRS, стр. 109-118. IEEE, (2015)An improved Hidden Markov Model for anomaly detection using frequent common patterns., , и . ICC, стр. 1113-1117. IEEE, (2012)Towards a formal framework for evaluating the effectiveness of system diversity when applied to security., , и . CISDA, стр. 1-7. IEEE, (2012)Towards Quality-Driven SOA Systems Refactoring Through Planning., , , , и . MCETECH, том 209 из Lecture Notes in Business Information Processing, стр. 269-284. Springer, (2015)Software Clustering Using Dynamic Analysis and Static Dependencies., , и . CSMR, стр. 27-36. IEEE Computer Society, (2009)Execution Traces: A New Domain That Requires the Creation of a Standard Metamodel., и . FGIT-ASEA, том 59 из Communications in Computer and Information Science, стр. 253-263. Springer, (2009)Summarizing the Content of Large Traces to Facilitate the Understanding of the Behaviour of a Software System., и . ICPC, стр. 181-190. IEEE Computer Society, (2006)Identifying computational phases from inter-process communication traces of HPC applications., и . ICPC, стр. 133-142. IEEE Computer Society, (2012)