Author of the publication

Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012.

, , and . Journal of Software: Evolution and Process, 26 (6): 531-532 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tridimensional Approach for Studying the Formal Verification of Model Transformations., , , , , , , and . ICST, page 921-928. IEEE Computer Society, (2012)GaiusT: supporting the extraction of rights and obligations for regulatory compliance., , , , and . Requir. Eng., 20 (1): 1-22 (2015)Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012., , and . Journal of Software: Evolution and Process, 26 (6): 531-532 (2014)SL Parses The LR Languages., and . Comput. Lang., 13 (2): 65-74 (1988)A Survey of Model Comparison Approaches and Applications., and . MODELSWARD, page 265-277. SciTePress, (2013)Vector space analysis of software clones., and . ICPC, page 233-237. IEEE Computer Society, (2009)Grammatical Inference in Software Engineering: An Overview of the State of the Art., and . SLE, volume 7745 of Lecture Notes in Computer Science, page 204-223. Springer, (2012)Semi-Automatic Semantic Annotations for Web Documents., , , , and . SWAP, volume 166 of CEUR Workshop Proceedings, CEUR-WS.org, (2005)Excerpts from the TXL Cookbook.. GTTSE, volume 6491 of Lecture Notes in Computer Science, page 27-91. Springer, (2009)A Survey of Analysis Models and Methods in Website Verification and Testing., , and . ICWE, volume 4607 of Lecture Notes in Computer Science, page 306-311. Springer, (2007)