Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements by Contracts allow Automated System Testing, , , and . ISSRE '03: Proceedings of the 14th International Symposium on Software Reliability Engineering, page 85. Washington, DC, USA, IEEE Computer Society, (2003)Artificial Mutation inspired Hyper-heuristic for Runtime Usage of Multi-objective Algorithms., , , and . CoRR, (2014)XSS-FP: Browser Fingerprinting using HTML Parser Quirks, , , , , and . CoRR, (2012)Mining Fix Patterns for FindBugs Violations., , , , and . CoRR, (2017)What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning., , , , and . CoRR, (2020)DRE: density-based data selection with entropy for adversarial-robust deep learning models., , , , and . Neural Comput. Appl., 35 (5): 4009-4026 (February 2023)Smells in system user interactive tests., , , , and . Empir. Softw. Eng., 28 (1): 20 (2023)SSPCatcher: Learning to catch security patches., , , , , , and . Empir. Softw. Eng., 27 (6): 151 (2022)Roundtable: Research Opportunities and Challenges for Emerging Software Systems., , , , and . J. Comput. Sci. Technol., 30 (5): 935-941 (2015)Under Pressure Benchmark for DDBMS Availability., , , , , and . J. Inf. Data Manag., 4 (3): 266-278 (2013)