Author of the publication

Graph-based pattern-oriented, context-sensitive source code completion.

, , , , , , and . ICSE, page 69-79. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clone Management for Evolving Software., , , , and . IEEE Trans. Software Eng., 38 (5): 1008-1026 (2012)The Energy-Aware Operational Time of Wireless Ad-Hoc Sensor Networks., and . MONET, 18 (3): 454-463 (2013)Energy-Aware Optimization Model in Chain-Based Routing.. MONET, 19 (2): 249-257 (2014)Maximizing the Lifetime of Wireless Sensor Networks with the Base Station Location., , and . ICTCC, volume 144 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 108-116. Springer, (2014)An L1-Regression Random Forests Method for Forecasting of Hoa Binh Reservoir's Incoming Flow.. KSE, page 360-364. IEEE, (2015)Database-Aware Fault Localization for Dynamic Web Applications., , , and . ICSM, page 456-459. IEEE Computer Society, (2013)Complete and accurate clone detection in graph-based models., , , , and . ICSE, page 276-286. IEEE, (2009)Inferring developer expertise through defect analysis., , , , and . ICSE, page 1297-1300. IEEE Computer Society, (2012)Throughput of primary user with cognitive radio function., and . ISCIT, page 122-125. IEEE, (2014)Currying Self-* Actions in Autonomic Systems., and . ICTCC, volume 168 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-10. Springer, (2016)