Author of the publication

A large study on the effect of code obfuscation on the quality of java code.

, , , and . Empirical Software Engineering, 20 (6): 1486-1524 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed group working in software engineering education., , , , , , , and . Information & Software Technology, 40 (4): 221-227 (1998)A Method to Recover Design Patterns Using Software Product Metrics., and . ICSR, volume 1844 of Lecture Notes in Computer Science, page 318-335. Springer, (2000)SEGWorld: A WWW-Based Infrastructure to Support the Development of Shared Software Engineering Artifacts., and . WETICE, page 120-125. IEEE Computer Society, (1999)WETICE 2004 ECE Workshop - Final Report., and . WETICE, page 155-160. IEEE Computer Society, (2004)An Evaluation Framework to Drive Future Evolution of a Research Prototype., , and . WETICE, page 180-185. IEEE Computer Society, (2004)Is maintenance ready for evolution?, , and . ICSM, page 367-. IEEE Computer Society, (1995)A large study on the effect of code obfuscation on the quality of java code., , , and . Empirical Software Engineering, 20 (6): 1486-1524 (2015)Using application understanding to support impact analysis., and . Journal of Software Maintenance, 10 (2): 93-110 (1998)logo on microsystems.. Microprocessors and Microsystems - Embedded Hardware Design, 8 (3): 115-118 (1984)An Evaluation of the State-of-the-Art for Application Management., , and . ICSM, page 161-169. IEEE Computer Society, (1994)