The SCEAS System
Navigation Menu

Search the dblp DataBase


Luigi Cerulo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gerardo Canfora, Luigi Cerulo, Luigi Troiano
    Transforming quantities into qualities in assessment of software systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:312-319 [Conf]
  2. Lerina Aversano, Luigi Cerulo, Massimiliano Di Penta
    How Clones are Maintained: An Empirical Study. [Citation Graph (0, 0)][DBLP]
    CSMR, 2007, pp:81-90 [Conf]
  3. Gerardo Canfora, Luigi Cerulo
    Jimpa: An Eclipse Plug-in for Impact Analysis. [Citation Graph (0, 0)][DBLP]
    CSMR, 2006, pp:341-342 [Conf]
  4. Gerardo Canfora, Luigi Cerulo, Luigi Troiano
    Can Fuzzy Mathematics enrich the Assessment of Software Maintainability? [Citation Graph (0, 0)][DBLP]
    Software Audit and Metrics, 2004, pp:85-94 [Conf]
  5. Gerardo Canfora, Luigi Cerulo, Massimiliano Di Penta
    On the Use of Line Co-change for Identifying Crosscutting Concern Code. [Citation Graph (0, 0)][DBLP]
    ICSM, 2006, pp:213-222 [Conf]
  6. Luigi Cerulo, Raffaele Esposito, Maria Tortorella, Luigi Troiano
    Supporting Software Evolution by using Fuzzy Logic. [Citation Graph (0, 0)][DBLP]
    IWPSE, 2004, pp:137-142 [Conf]
  7. Gerardo Canfora, Luigi Cerulo
    Impact Analysis by Mining Software and Change Request Repositories. [Citation Graph (0, 0)][DBLP]
    IEEE METRICS, 2005, pp:29- [Conf]
  8. Gerardo Canfora, Luigi Cerulo, Rita Scognamiglio
    Measuring XML Document Similarity: A Case Study for Evaluating Information Extraction Systems. [Citation Graph (0, 0)][DBLP]
    IEEE METRICS, 2004, pp:36-45 [Conf]
  9. Gerardo Canfora, Luigi Cerulo
    Fine grained indexing of software repositories to support impact analysis. [Citation Graph (0, 0)][DBLP]
    MSR, 2006, pp:105-111 [Conf]
  10. Gerardo Canfora, Luigi Cerulo
    Where is bug resolution knowledge stored? [Citation Graph (0, 0)][DBLP]
    MSR, 2006, pp:183-184 [Conf]
  11. Gerardo Canfora, Luigi Cerulo
    Supporting change request assignment in open source development. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1767-1772 [Conf]
  12. Gerardo Canfora, Luigi Cerulo
    A visual approach to define XML to FO transformations. [Citation Graph (0, 0)][DBLP]
    SEKE, 2002, pp:563-570 [Conf]
  13. Gerardo Canfora, Luigi Cerulo, Rosa Preziosi, Luigi Troiano
    A Tool for Decision Support Implementing OFNWA Approach: A Case Study. [Citation Graph (0, 0)][DBLP]
    SEKE, 2003, pp:714-720 [Conf]
  14. Gerardo Canfora, Luigi Cerulo, Luigi Troiano
    An Experience of Fuzzy Linear Regression applied to Effort Estimation. [Citation Graph (0, 0)][DBLP]
    SEKE, 2004, pp:57-61 [Conf]
  15. Luigi Cerulo
    On the Use of Process Trails to Understand Software Development. [Citation Graph (0, 0)][DBLP]
    WCRE, 2006, pp:303-304 [Conf]
  16. Gerardo Canfora, Luigi Cerulo
    How Crosscutting Concerns Evolve in JHotDraw. [Citation Graph (0, 0)][DBLP]
    STEP, 2005, pp:65-73 [Conf]
  17. Gerardo Canfora, Luigi Cerulo, Massimiliano Di Penta
    Identifying Changed Source Code Lines from Version Repositories. [Citation Graph (0, 0)][DBLP]
    MSR, 2007, pp:14- [Conf]
  18. Lerina Aversano, Gerardo Canfora, Luigi Cerulo, Concettina Del Grosso, Massimiliano Di Penta
    An empirical study on the evolution of design patterns. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2007, pp:385-394 [Conf]

  19. Ldiff: An enhanced line differencing tool. [Citation Graph (, )][DBLP]

  20. An eclectic approach for change impact analysis. [Citation Graph (, )][DBLP]

  21. An empirical study of the relationships between design pattern roles and class change proneness. [Citation Graph (, )][DBLP]

  22. An Exploratory Study of Factors Influencing Change Entropy. [Citation Graph (, )][DBLP]

  23. Learning from bug-introducing changes to prevent fault prone code. [Citation Graph (, )][DBLP]

  24. Relating the Evolution of Design Patterns and Crosscutting Concerns. [Citation Graph (, )][DBLP]

  25. The Evolution and Decay of Statically Detected Source Code Vulnerabilities. [Citation Graph (, )][DBLP]

  26. Learning gene regulatory networks from only positive and unlabeled data. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002