Author of the publication

What Security Questions Do Developers Ask? A Large-Scale Study of Stack Overflow Posts.

, , , , and . J. Comput. Sci. Technol., 31 (5): 910-924 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Inference of Software Library Usage Patterns., , , , , and . CoRR, (2016)Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps., , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 678-690. Springer, (2017)Collaboration Patterns in Software Developer Network., , and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Combined classifier for cross-project defect prediction: an extended empirical study., , , and . Frontiers Comput. Sci., 12 (2): 280-296 (2018)Condensing class diagrams by analyzing design and network metrics using optimistic classification., , , and . ICPC, page 110-121. ACM, (2014)Revisiting supervised and unsupervised models for effort-aware just-in-time defect prediction., , and . Empirical Software Engineering, 24 (5): 2823-2862 (2019)Automatic query reformulation for code search using crowdsourced knowledge., , and . Empirical Software Engineering, 24 (4): 1869-1924 (2019)Collective Personalized Change Classification With Multiobjective Search., , , and . IEEE Trans. Reliability, 65 (4): 1810-1829 (2016)An Empirical Study of Bugs in Software Build System., , , , and . IEICE Transactions, 97-D (7): 1769-1780 (2014)Mining direct antagonistic communities in signed social networks., , , , and . Inf. Process. Manage., 49 (4): 773-791 (2013)