Author of the publication

Graph-based pattern-oriented, context-sensitive source code completion.

, , , , , , and . ICSE, page 69-79. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

COMB: computing relevant program behaviors., , , , and . ICSE (Companion Volume), page 109-112. ACM, (2018)Insights for Practicing Engineers from a Formal Verification Study of the Linux Kernel., , and . ISSRE Workshops, page 264-270. IEEE Computer Society, (2016)Event-Flow Graphs for Efficient Path-Sensitive Analyses., , and . CoRR, (2014)Human-machine resolution of Invisible Control Flow?, , and . ICPC, page 1-4. IEEE Computer Society, (2016)Fuzzy set-based automatic bug triaging., , , and . ICSE, page 884-887. ACM, (2011)Fuzzy set approach for automatic tagging in evolving software., , , , and . ICSM, page 1-10. IEEE Computer Society, (2010)Modeling lessons from verifying large software systems for safety and security., , , and . WSC, page 1431-1442. IEEE, (2017)SYMake: a build code analysis and refactoring tool for makefiles., , , and . ASE, page 366-369. ACM, (2012)Fuzzy set and cache-based approach for bug triaging., , , and . SIGSOFT FSE, page 365-375. ACM, (2011)A "Human-in-the-loop" approach for resolving complex software anomalies., , , , and . SMC, page 1971-1978. IEEE, (2014)