Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Bayesian Approach to Privacy Enforcement in Smartphones., and . USENIX Security Symposium, page 175-190. USENIX Association, (2014)Lifting model transformations to product lines., , , , and . ICSE, page 117-128. ACM, (2014)eTainter: detecting gas-related vulnerabilities in smart contracts., , and . ISSTA, page 728-739. ACM, (2022)Precise semantic history slicing through dynamic delta refinement., , , and . ASE, page 495-506. ACM, (2016)AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities., , and . ICSE, page 945-956. IEEE, (2023)Kuber: Cost-Efficient Microservice Deployment Planner., , and . SANER, page 252-262. IEEE, (2022)5th International Workshop on Product LinE Approaches in Software Engineering PLE for a Sustainable Society (PLEASE 2015)., , , and . ICSE (2), page 989-990. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Client-specific equivalence checking., , , and . ASE, page 441-451. ACM, (2018)Analyzing the analyzers: FlowDroid/IccTA, AmanDroid, and DroidSafe., , and . ISSTA, page 176-186. ACM, (2018)Combining Related Products into Product Lines., and . FASE, volume 7212 of Lecture Notes in Computer Science, page 285-300. Springer, (2012)