Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices., , , , , , , , and . IEEE Access, (2020)Automated error log resolution: a case study., , , , , and . SAC, page 1298-1304. ACM, (2021)Mapping Study on Constraint Consistency Checking in Distributed Enterprise Systems., , , , , , , and . RACS, page 167-174. ACM, (2020)Visualizing architectural evolution via provenance tracking: a systematic review., , , , , and . RACS, page 83-91. ACM, (2022)Adaptive algorithm for vector field interpolation based on octree structure., and . SCCG, page 151-156. ACM, (2002)Architectural languages in the microservice era: a systematic mapping study., , , , , , and . RACS, page 39-46. ACM, (2022)Failure Prediction by Utilizing Log Analysis: A Systematic Mapping Study., , , , , , , , and . RACS, page 188-195. ACM, (2020)On Matching Log Analysis to Source Code: A Systematic Mapping Study., , , , , , , , and . RACS, page 181-187. ACM, (2020)Particle rendering pipeline., , and . SCCG, page 165-170. ACM, (2003)On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends., , , , , , , , and . RACS, page 175-180. ACM, (2020)