Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster Abstract: BUFS: Towards Bottom-Up Foundational Security for Software in the Internet-of-Things., , and . SEC, page 107-108. IEEE Computer Society, (2016)Modularity-based community detection in large networks: An empirical evaluation., , and . ICIA, page 1131-1136. IEEE, (2014)Theia: Visual Signatures for Problem Diagnosis in Large Hadoop Clusters., , , , and . login Usenix Mag., (2013)Empower Text-Attributed Graphs Learning with Large Language Models (LLMs)., , , , , and . CoRR, (2023)MapTracker: Tracking with Strided Memory Fusion for Consistent Vector HD Mapping., , , , and . CoRR, (2024)AUSPICE: Automatic Safety Property Verification for Unmodified Executables., , , and . VSTTE, volume 9593 of Lecture Notes in Computer Science, page 202-222. Springer, (2015)Visual, Log-Based Causal Tracing for Performance Debugging of MapReduce Systems., , , and . ICDCS, page 795-806. IEEE Computer Society, (2010)AUSPICE-R: Automatic Safety-Property Proofs for Realistic Features in Machine Code., , , and . APLAS, volume 10017 of Lecture Notes in Computer Science, page 42-62. (2016)Automated text categorization by generalized kernel machines., , and . ICIA, page 376-381. IEEE, (2014)Program Repair by Fuzzing over Patch and Input Space., , , , and . CoRR, (2023)