Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HeROfake: Heterogeneous Resources Orchestration in a Serverless Cloud - An Application to Deepfake Detection., , , , , , , , and . CCGrid, page 154-165. IEEE, (2023)A WebRTC Extension to Allow Identity Negotiation at Runtime., , , and . ICWE, volume 10360 of Lecture Notes in Computer Science, page 412-419. Springer, (2017)The Hitchhiker's Guide to Malicious Third-Party Dependencies., , , , , and . SCORED@CCS, page 65-74. ACM, (2023)Challenges on software unbundling: growing and letting go., , and . MODULARITY (Companion), page 43-46. ACM, (2015)Customizing the common variability language semantics for your domain models., , , and . VARY@MoDELS, page 3-8. ACM, (2012)On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI., , , , and . ACSAC, page 71-82. ACM, (2023)Leveraging metamorphic testing to automatically detect inconsistencies in code generator families., , , and . Softw. Test. Verification Reliab., (2020)Learning Contextual-Variability Models., , , and . IEEE Softw., 34 (6): 64-70 (2017)RISCLESS: A Reinforcement Learning Strategy to Exploit Unused Cloud Resources., , , , , and . CoRR, (2022)Taming Dynamically Adaptive Systems using models and aspects, , , and . ICSE '09: Proceedings of the 31st International Conference on Software Engineering, page 122--132. Washington, DC, USA, IEEE Computer Society, (2009)