Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

jGuard: Programming Misuse-Resilient APIs., , , and . SLE, page 161-174. ACM, (2022)Copy and paste redeemed., and . Software Engineering, volume P-252 of LNI, page 61-62. GI, (2016)Evaluating and improving transformers pre-trained on ASTs for Code Completion., , and . SANER, page 834-844. IEEE, (2023)Dealing with Variability in API Misuse Specification., , , , and . ECOOP, volume 194 of LIPIcs, page 19:1-19:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild., , , , and . TrustCom, page 315-322. IEEE, (2022)Towards Trustworthy AI Software Development Assistance., , and . NIER@ICSE, page 112-116. ACM, (2024)Towards Code Generation from BDD Test Case Specifications: A Vision., , , , , and . CAIN, page 139-144. IEEE, (2023)Introducing FUM: A Framework for API Usage Constraint and Misuse Classification., , , and . Software Engineering, volume P-332 of LNI, page 105-106. Gesellschaft für Informatik e.V., (2023)BRAID: an API recommender supporting implicit user feedback., , , , , and . ESEC/SIGSOFT FSE, page 1510-1514. ACM, (2021)A Critical Study of What Code-LLMs (Do Not) Learn., , , and . CoRR, (2024)