Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enveloping "Persistent" Tools for a Process-Centered Environment., and . EWSPT, volume 913 of Lecture Notes in Computer Science, page 200-204. Springer, (1995)Garp: Graph Abstractions for Concurrent Programming., and . ESOP, volume 300 of Lecture Notes in Computer Science, page 191-205. Springer, (1988)Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles., , and . IEEE Trans. Software Eng., 49 (4): 1860-1875 (April 2023)Vignat: Vulnerability identification by learning code semantics via graph attention networks., and . CoRR, (2023)An Architectural Survey of Object Management Systems., and . Int. J. Cooperative Inf. Syst., 1 (3-4): 515-578 (1992)MARVEL 3: 1: A Multi-User Software Development Environment.. ILPS, page 36-39. MIT Press, (1993)Intelligent Assistance for Software Development and Maintenance., , and . IEEE Softw., 5 (3): 40-49 (1988)BUGMINER: Software Reliability Analysis Via Data Mining of Bug Reports., , , and . SEKE, page 95-100. Knowledge Systems Institute Graduate School, (2011)An Approach to Software Testing of Machine Learning Applications., , and . SEKE, page 167-. Knowledge Systems Institute Graduate School, (2007)RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies., , , , and . UPSEC, USENIX Association, (2008)