Author of the publication

Differential Privacy for Coverage Analysis of Software Traces.

, , , , and . ECOOP, volume 194 of LIPIcs, page 8:1-8:25. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond Reuse Distance Analysis: Dynamic Analysis for Characterization of Data Locality Potential., , , , , , , and . CoRR, (2014)Generating run-time progress reports for a points-to analysis in Eclipse., , and . ETX, page 40-44. ACM, (2006)Efficient Distributed Algorithms for Convolutional Neural Networks., , , , and . SPAA, page 439-442. ACM, (2021)Analysis and testing of notifications in Android wear applications., and . ICSE, page 347-357. IEEE / ACM, (2017)Precise memory leak detection for java software using container profiling., and . ICSE, page 151-160. ACM, (2008)IDE Dataflow Analysis in the Presence of Large Object-Oriented Libraries., , and . CC, volume 4959 of Lecture Notes in Computer Science, page 53-68. Springer, (2008)Sentinel: generating GUI tests for sensor leaks in Android and Android wear apps., , , and . Softw. Qual. J., 28 (1): 335-367 (2020)Beyond reuse distance analysis: Dynamic analysis for characterization of data locality potential., , , , , , , and . ACM Trans. Archit. Code Optim., 10 (4): 53:1-53:29 (2013)Fragment Class Analysis for Testing of Polymorphism in Java Software., , and . IEEE Trans. Software Eng., 30 (6): 372-387 (2004)Scalable Runtime Bloat Detection Using Abstract Dynamic Slicing., , , , , and . ACM Trans. Softw. Eng. Methodol., 23 (3): 23:1-23:50 (2014)