Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Coupling Pattern in Computational Science and Engineering Software., , , and . SE4Science@ICSE, page 9-12. IEEE, (2017)Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model., , , , and . Computer and Information Science, 5 (2): 29-38 (2012)Multi-Location Program Repair: Roads Ahead., , , , and . CoRR, (2018)Deep Learning Based Program Generation From Requirements Text: Are We There Yet?, , , , , and . IEEE Trans. Software Eng., 48 (4): 1268-1289 (2022)Detecting Features Concerning Privacy From App Reviews., , , , and . CoRR, (2022)Towards Norm Classification: An Initial Analysis of HIPAA Breaches., , , and . RE Workshops, page 415-420. IEEE, (2021)An RE'21 Workshop on Environment-Driven Requirements Engineering (EnviRE'21)., , and . RE Workshops, page 421. IEEE, (2021)Welcome from the Organizers., , , , and . RE Workshops, page 1-2. IEEE, (2021)Multi-level decomposition approach for problem solving and design in software engineering., , and . ACM Southeast Regional Conference, page 249-254. ACM, (2011)Modular development and verification of domain requirements via model checking., , and . ACM Southeast Regional Conference, page 58. ACM, (2010)