Author of the publication

Are your sites down? Requirements-driven self-tuning for the survivability of Web systems.

, , , and . RE, page 219-228. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In Defense of Simple Techniques for Neural Network Test Case Selection., , , , and . ISSTA, page 501-513. ACM, (2023)Localized or architectural: an empirical study of performance issues dichotomy., , , , and . ICSE (Companion Volume), page 316-317. IEEE / ACM, (2019)Characterizing usages, updates and risks of third-party libraries in Java projects., , , , , , , and . Empir. Softw. Eng., 27 (4): 90 (2022)MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1165-1182. USENIX Association, (2020)Steelix: program-state based binary fuzzing., , , , , and . ESEC/SIGSOFT FSE, page 627-637. ACM, (2017)SPAIN: security patch analysis for binaries towards understanding the pain and pills., , , , and . ICSE, page 462-472. IEEE / ACM, (2017)DangDone: Eliminating Dangling Pointers via Intermediate Pointers., , , , , , , and . Internetware, page 6:1-6:10. ACM, (2018)Patch based vulnerability matching for binary programs., , , , , and . ISSTA, page 376-387. ACM, (2020)Demystifying Dependency Bugs in Deep Learning Stack., , , , , and . ESEC/SIGSOFT FSE, page 450-462. ACM, (2023)Survivability-oriented self-tuning of web systems., , , and . WWW (Companion Volume), page 23-24. ACM, (2011)