Author of the publication

Trading-off security and performance in barrier slicing for remote software entrusting.

, , , , and . Autom. Softw. Eng., 16 (2): 235-261 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interpolated n-grams for model based testing., , and . ICSE, page 562-572. ACM, (2014)E2E Web Test Dependency Detection using NLP., , , , and . CoRR, (2019)Supporting Ontology-Based Semantic Annotation of Business Processes with Automated Suggestions., and . Int. J. Inf. Syst. Model. Des., 1 (2): 59-84 (2010)Automated inference of classifications and dependencies for combinatorial testing., and . ASE, page 622-627. IEEE, (2013)Using a Concept Lattice of Decomposition Slices for Program Understanding and Impact Analysis.. IEEE Trans. Software Eng., 29 (6): 495-509 (2003)Repairing DNN Architecture: Are We There Yet?, , , , and . ICST, page 234-245. IEEE, (2023)Simulation-based Test Case Generation for Unmanned Aerial Vehicles in the Neighborhood of Real Flights., , and . ICST, page 281-292. IEEE, (2023)Toward In-Vivo Testing of Mobile Applications., , , , , and . ISSRE Workshops, page 137-143. IEEE, (2019)Generating metamorphic relations for cyber-physical systems with genetic programming: an industrial case study., , , , , and . ESEC/SIGSOFT FSE, page 1264-1274. ACM, (2021)DeepAtash: Focused Test Generation for Deep Learning Systems., , and . ISSTA, page 954-966. ACM, (2023)