Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comprehensive and scalable method for analyzing fine-grained source code change patterns., , and . SANER, page 351-360. IEEE Computer Society, (2015)Enhancing History-Based Concern Mining with Fine-Grained Change Analysis., and . CSMR, page 75-84. IEEE Computer Society, (2012)A Robot-Controlling Agent Description with Finite State Machines., , , and . DARS, page 225-234. Springer, (1998)Goal-directed human activity computing., , and . J. Ambient Intell. Smart Environ., 3 (2): 127-145 (2011)Context-Sensitive Flow Graph and Projective Single Assignment Form for Resolving Context-Dependency of Binary Code., , and . PLAS@CCS, page 48-53. ACM, (2018)Automated patch extraction via syntax- and semantics-aware Delta debugging on source code changes., , and . ESEC/SIGSOFT FSE, page 598-609. ACM, (2018)Detecting and analyzing code clones in HDL., , , , and . IWSC, page 1-7. IEEE Computer Society, (2017)Noroshi - A Distributed Schedule Management System using P2P Wireless, Ad-hoc Networking., , , and . WWW (Posters), (2003)Coherence for Cartesian Closed Categories: A Sequential Approach., and . CTRS, volume 968 of Lecture Notes in Computer Science, page 276-295. Springer, (1994)Detecting Unknown Computer Viruses - A New Approach.. ISSS, volume 3233 of Lecture Notes in Computer Science, page 226-241. Springer, (2003)