Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CrimeSPOT: a Language and Runtime for Developing Active Wireless Sensor Network Applications, , , , and . Science of Computer Programming, (2012)Run-time Validation of Behavioral Adaptations., , , and . COP@ECOOP, page 5:1-5:6. ACM, (2014)A Flexible Framework for Studying Trace-Based Just-In-Time Compilation, , and . Computer Languages, Systems & Structures, (July 2017)Back to the Past - Analysing Backporting Practices in Package Dependency Networks., , , and . IEEE Trans. Software Eng., 48 (10): 4087-4099 (2022)An empirical evaluation of quasi-static executable slices., , and . J. Syst. Softw., (June 2023)Analysis of third-party JavaScript, Python and Ruby packages in DockerHub images., , and . (October 2020)Improving trace-based JIT optimisation using whole-program information., and . VMIL@SPLASH, page 16-23. ACM, (2016)Identifying Versions of Libraries used in Stack Overflow Code Snippets., , and . MSR, page 341-345. IEEE, (2021)Dynamic Slicing of WebAssembly Binaries., , and . ICSME, page 84-96. IEEE, (2023)Uncovering Library Features from API Usage on Stack Overflow., , and . SANER, page 207-217. IEEE, (2022)