Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Exploratory Study on Codes in Heterogeneous Software Documents., , and . Internetware, page 14:1-14:6. ACM, (2018)A Framework for Trust Enabled Software Asset Retrieval., , , , and . ATC, volume 6407 of Lecture Notes in Computer Science, page 139-153. Springer, (2010)Deep learning based feature envy detection., , and . ASE, page 385-396. ACM, (2018)Interrogative-guided re-ranking for question-oriented software text retrieval., , , and . ASE, page 115-120. ACM, (2014)Educational Evaluation in the PKU SPOC Course "Data Structures and Algorithms"., , , , , and . L@S, page 237-240. ACM, (2015)Graph Embedding Based API Graph Search and Recommendation., , , and . J. Comput. Sci. Technol., 34 (5): 993-1006 (2019)Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect., , , , , , and . ICYCS, page 2347-2353. IEEE Computer Society, (2008)Rectifying Prejudicial Feedback Ratings in Reputation based Trust Management., , , , and . IEEE SCC, page 530-535. IEEE Computer Society, (2007)Leveraging Robust Service Evaluation by Introducing the Web of Trust., , , and . IEEE CLOUD, page 190-197. IEEE, (2009)Internet-Based Evaluation and Prediction of Web Services Trustworthiness., , , , and . COMPSAC Workshops, page 571-576. IEEE Computer Society, (2012)