Author of the publication

Applying Webmining Techniques to Execution Traces to Support the Program Comprehension Process.

, , , and . CSMR, page 134-142. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HiDER: Query-Driven Entity Resolution for Historical Data, , , , , , and . European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), (2015)Introduction to the special section on educational data mining., and . SIGKDD Explor., 13 (2): 3-6 (2011)Roman Urdu toxic comment classification., , , , and . Lang. Resour. Evaluation, 55 (4): 971-996 (2021)Keeping the Data Lake in Form: Proximity Mining for Pre-Filtering Schema Matching., , , and . ACM Trans. Inf. Syst., 38 (3): 26:1-26:30 (2020)Model-based Counterfactual Generator for Gender Bias Mitigation., and . CoRR, (2023)Discovering Roll-Up Dependencies., , and . KDD, page 213-222. ACM, (1999)Recent Developments in Pattern Mining.. ALT, volume 7568 of Lecture Notes in Computer Science, page 34. Springer, (2012)Detecting and Explaining Drifts in Yearly Grant Applications., and . CoRR, (2018)Using minimum description length for process mining., , , and . SAC, page 1451-1455. ACM, (2009)The Way Forward., , , and . Discrimination and Privacy in the Information Society, volume 3 of Studies in Applied Philosophy, Epistemology and Rational Ethics, Springer, (2013)