Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Issue Tracking Systems with Community-Based Question and Answering Websites., and . Australian Software Engineering Conference, page 88-96. IEEE Computer Society, (2013)Identifying Software Process Management Challenges: Survey of Practitioners in a Large Global IT Company., , , and . MSR, page 346-356. IEEE, (2015)Table Extraction from PDF Files using combination of Heuristics and Machine Learning Techniques., , , and . IICAI, page 2170-2182. IICAI, (2009)Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos., , and . PST, page 84-93. IEEE, (2014)Detecting Duplicate Bug Report Using Character N-Gram-Based Features., and . APSEC, page 366-374. IEEE Computer Society, (2010)Applying the Generalized Vickrey Auction to Pricing Reliable Multicasts., and . QofIS, volume 2511 of Lecture Notes in Computer Science, page 283-292. Springer, (2002)Empirical Analysis on Effectiveness of Source Code Metrics for Predicting Change-Proneness., , and . ISEC, page 4-14. ACM, (2017)Using Structured Text Source Code Metrics and Artificial Neural Networks to Predict Change Proneness at Code Tab and Program Organization Level., and . ISEC, page 172-180. ACM, (2017)Investigating the Role of Twitter in E-Governance by Extracting Information on Citizen Complaints and Grievances Reports., and . BDA, volume 10721 of Lecture Notes in Computer Science, page 300-310. Springer, (2017)Pariket: Mining Business Process Logs for Root Cause Analysis of Anomalous Incidents., , and . DNIS, volume 8999 of Lecture Notes in Computer Science, page 244-263. Springer, (2015)