Author of the publication

Exploiting abstract change pattern from code changes.

, , , , and . Journal of Intelligent and Fuzzy Systems, 35 (2): 1597-1608 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Bridge Deterioration Modelling Using Rainfall Data from the Bureau of Meteorology., , and . AusDM, volume 168 of CRPIT, page 161-167. Australian Computer Society, (2015)C-V2X Supported Automated Driving., , , , , and . ICC Workshops, page 1-5. IEEE, (2019)Analytical and simulation modeling of a multi-server queue with Markovian arrivals and priority services., and . Simulation Modelling Practice and Theory, (2012)Effective Interference Cancellation Scheme for Device-to-Device Communication Underlaying Cellular Networks., , , , and . VTC Fall, page 1-5. IEEE, (2010)Joint Resource Allocation for Multi-User and Two-Way Multi-Relay OFDMA Networks., , , , and . VTC Spring, page 1-5. IEEE, (2014)Uplink transceiver for subcarrier index modulation OFDM in massive MIMO systems with imperfect channel state information., , , and . WCSP, page 1-6. IEEE, (2016)Robust extraction for low-contrast liver tumors using modified adaptive likelihood estimation., , , and . Int. J. Comput. Assist. Radiol. Surg., 13 (10): 1565-1578 (2018)Network Security Risk Assessment Based on Item Response Theory., , , and . ICST Trans. Security Safety, 2 (5): e5 (2015)An improved framework of distributed video codec., , , and . ICT, page 493-498. IEEE, (2011)Deep learning the semantics of change sequences for query expansion., , and . Softw., Pract. Exper., 49 (11): 1600-1617 (2019)