Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TRACER: A Symbolic Execution Tool for Verification., , , and . CAV, volume 7358 of Lecture Notes in Computer Science, page 758-766. Springer, (2012)Learning to Learn to Predict Performance Regressions in Production at Meta., , , , , , , , and . CoRR, (2022)Bayesian specification learning for finding API usage errors., , and . ESEC/SIGSOFT FSE, page 151-162. ACM, (2017)Scalable Statistical Root Cause Analysis on App Telemetry., , , and . ICSE (SEIP), page 288-297. IEEE, (2021)Path-Sensitive Backward Slicing., , , and . SAS, volume 7460 of Lecture Notes in Computer Science, page 231-247. Springer, (2012)Neural Sketch Learning for Conditional Program Generation., , , and . ICLR, OpenReview.net, (2018)Counterfactual Explanations for Models of Code., , , and . Software Engineering, volume P-343 of LNI, page 91-92. Gesellschaft für Informatik e.V., (2024)Boosting concolic testing via interpolation., , and . ESEC/SIGSOFT FSE, page 48-58. ACM, (2013)Detecting Privacy-Sensitive Code Changes with Language Modeling., , , , and . MSR, page 761-762. ACM, (2022)Towards Predictive Modeling of Message-Passing Communication., , , , and . HPCC, page 482-487. IEEE, (2009)