Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards foundational verification of cyber-physical systems., , , and . SOSCYPS@CPSWeek, page 1-5. IEEE Computer Society, (2016)Deep typechecking and refactoring., , , , and . OOPSLA, page 37-52. ACM, (2008)Latent Variable Models for Predicting File Dependencies in Large-Scale Software Development., , , , and . NIPS, page 865-873. Curran Associates, Inc., (2010)WitchDoctor: IDE support for real-time auto-completion of refactorings., , and . ICSE, page 222-232. IEEE Computer Society, (2012)Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis., , , , , , and . SAS, volume 2477 of Lecture Notes in Computer Science, page 230-246. Springer, (2002)Rango: Adaptive Retrieval-Augmented Proving for Automated Software Verification., , , , , , , , and . CoRR, (2024)Finding root causes of floating point error., , , and . PLDI, page 256-269. ACM, (2018)Codespells: how to design quests to teach java concepts., , , , and . J. Comput. Sci. Coll., 29 (4): 114-122 (2014)Targeted Synthesis for Programming with Data Invariants., , , and . CoRR, (2019)A Computational Stack for Cross-Domain Acceleration., , , , , , , and . HPCA, page 54-70. IEEE, (2021)