Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Latent Variable Models for Predicting File Dependencies in Large-Scale Software Development., , , , and . NIPS, page 865-873. Curran Associates, Inc., (2010)Deep typechecking and refactoring., , , , and . OOPSLA, page 37-52. ACM, (2008)WitchDoctor: IDE support for real-time auto-completion of refactorings., , and . ICSE, page 222-232. IEEE Computer Society, (2012)Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis., , , , , , and . SAS, volume 2477 of Lecture Notes in Computer Science, page 230-246. Springer, (2002)Towards foundational verification of cyber-physical systems., , , and . SOSCYPS@CPSWeek, page 1-5. IEEE Computer Society, (2016)Rango: Adaptive Retrieval-Augmented Proving for Automated Software Verification., , , , , , , , and . CoRR, (2024)Finding root causes of floating point error., , , and . PLDI, page 256-269. ACM, (2018)Gobi: WebAssembly as a Practical Path to Library Sandboxing., , , , and . CoRR, (2019)Retrofitting Fine Grain Isolation in the Firefox Renderer., , , , , , , and . USENIX Security Symposium, page 699-716. USENIX Association, (2020)User-Guided Synthesis of Interactive Diagrams., , , , , and . CHI, page 195-207. ACM, (2017)