Author of the publication

An Empirical Validation of the Complexity of Code Changes and Bugs in Predicting the Release Time of Open Source Software.

, , , and . CSE, page 1201-1206. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bedi, Punam
add a person with the name Bedi, Punam
 

Other publications of authors with the same name

A Multi-Threaded Semantic Focused Crawler., , , , and . J. Comput. Sci. Technol., 27 (6): 1233-1242 (2012)A Self-organizing Self-healing On-demand Loop-free Path Routing Protocol Using Mobile Process Groups for Mobile Ad-hoc Networks., and . ARTCom, page 396-400. IEEE Computer Society, (2009)Finding Hubs and Authorities using Information Scent to Improve the Information Retrieval precision., and . IC-AI, page 185-191. CSREA Press, (2008)Using PSO in Image Hiding Scheme Based on LSB Substitution., , and . ACC (3), volume 192 of Communications in Computer and Information Science, page 259-268. Springer, (2011)Using PSO in a spatial domain based image hiding scheme with distortion tolerance., , and . Computers & Electrical Engineering, 39 (2): 640-654 (2013)Trust Aware Usability., and . J. of IT & Tourism, 8 (3-4): 215-226 (2006)Predicting the priority of a reported bug using machine learning techniques and cross project validation., , , and . ISDA, page 539-545. IEEE, (2012)Modeling user preferences in a hybrid recommender system using type-2 fuzzy sets., , , and . FUZZ-IEEE, page 1-8. IEEE, (2013)Intelligent wavelet domain watermarking of fingerprint images., , and . HIS, page 90-95. IEEE, (2012)Home security surveillance system using multi-robot system., , and . IJCAT, 45 (4): 272-279 (2012)