Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient, sensitivity resistant binary instrumentation., , and . ISSTA, page 89-99. ACM, (2011)Formalizing Sensitivity in Static Analysis for Intrusion Detection., , , , , and . S&P, page 194-. IEEE Computer Society, (2004)A Mechanism for Efficient Debugging of Parallel Programs., and . Workshop on Parallel and Distributed Debugging, page 141-150. ACM, (1988)Experiment Management Support for Performance Tuning., and . SC, page 8. ACM, (1997)A Lightweight Library for Building Scalable Tools., , and . PARA (2), volume 7134 of Lecture Notes in Computer Science, page 419-429. Springer, (2010)Safety checking of machine code., , and . PLDI, page 70-82. ACM, (2000)A Security Attack and Defense in the Grid Environment.. PVM/MPI, volume 2474 of Lecture Notes in Computer Science, page 10. Springer, (2002)An empirical study of reliability of Unix utilities, , and . Communications of the ACM, 33 (12): 32--44 (December 1990)Performance Measurement of Interpreted Programs., and . Euro-Par, volume 1470 of Lecture Notes in Computer Science, page 146-156. Springer, (1998)Diagnosing Distributed Systems with Self-propelled Instrumentation., and . Middleware, volume 5346 of Lecture Notes in Computer Science, page 82-103. Springer, (2008)