default search action
Matthias Rieger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2005
- [b1]Matthias Rieger:
Effective Clone Detection Without Language Barriers. University of Bern, Switzerland, 2005
Journal Articles
- 2007
- [j3]Bart Van Rompaey, Bart Du Bois, Serge Demeyer, Matthias Rieger:
On The Detection of Test Smells: A Metrics-Based Approach for General Fixture and Eager Test. IEEE Trans. Software Eng. 33(12): 800-817 (2007) - 2006
- [j2]Stéphane Ducasse, Oscar Nierstrasz, Matthias Rieger:
On the effectiveness of clone detection by string matching. J. Softw. Maintenance Res. Pract. 18(1): 37-58 (2006) - 1999
- [j1]Serge Demeyer, Matthias Rieger, Theo Dirk Meijler, Edzard S. Gelsema:
Class Composition for Specifying Framework Design. Theory Pract. Object Syst. 5(2): 73-81 (1999)
Conference and Workshop Papers
- 2013
- [c10]Marian Harbach, Sascha Fahl, Matthias Rieger, Matthew Smith:
On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards. Privacy Enhancing Technologies 2013: 245-264 - 2007
- [c9]Serge Demeyer, Bart Du Bois, Matthias Rieger, Bart Van Rompaey:
The LAN-simulation: A Refactoring Lab Session. WRT 2007: 52-53 - [c8]Matthias Rieger, Bart Van Rompaey, Roel Wuyts:
Teaching FAMIX about the Preprocessor. FAMOOSr@TOOLS 2007: 13-16 - 2006
- [c7]Filip Van Rysselberghe, Matthias Rieger, Serge Demeyer:
Detecting Move Operations in Versioning Information. CSMR 2006: 271-278 - 2005
- [c6]Serge Demeyer, Filip Van Rysselberghe, Tudor Gîrba, Jacek Ratzinger, Radu Marinescu, Tom Mens, Bart Du Bois, Dirk Janssens, Stéphane Ducasse, Michele Lanza, Matthias Rieger, Harald C. Gall, Mohammad El-Ramly:
The LAN-simulation: A Refactoring Teaching Example. IWPSE 2005: 123-134 - 2004
- [c5]Matthias Rieger, Stéphane Ducasse, Michele Lanza:
Insights into System-Wide Code Duplication. WCRE 2004: 100-109 - 1999
- [c4]Matthias Rieger, Stéphane Ducasse, Georges Golomingi:
Tool Support for Refactoring Duplicated OO Code. ECOOP Workshops 1999: 177-178 - [c3]Stéphane Ducasse, Matthias Rieger, Serge Demeyer:
A Language Independent Approach for Detecting Duplicated Code. ICSM 1999: 109-118 - 1998
- [c2]Matthias Rieger, Stéphane Ducasse:
Visual Detection of Duplicated Code. ECOOP Workshops 1998: 75-76 - 1997
- [c1]Serge Demeyer, Theo Dirk Meijler, Matthias Rieger:
Design Pattern Restructuring. ECOOP Workshops 1997: 280-282
Informal and Other Publications
- 2006
- [i1]Cory Kapser, Paul Anderson, Michael W. Godfrey, Rainer Koschke, Matthias Rieger, Filip Van Rysselberghe, Peter Weißgerber:
Subjectivity in Clone Judgment: Can We Ever Agree?. Duplication, Redundancy, and Similarity in Software 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint