From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting and analyzing insecure component usage., и . SIGSOFT FSE, стр. 5. ACM, (2012)Exploring and exploiting the correlations between bug-inducing and bug-fixing commits., , , , , , и . ESEC/SIGSOFT FSE, стр. 326-337. ACM, (2019)Algot: An Educational Programming Language with Human-Intuitive Visual Syntax., и . VL/HCC, стр. 1-5. IEEE, (2021)Back to the Future: A Framework for Automatic Malware Removal and System Repair, , , , и . CSE-2005-6. University of California, Davis, (2005)Validating JIT Compilers via Compilation Space Exploration., , , и . SOSP, стр. 66-79. ACM, (2023)Calling-to-reference context translation via constraint-guided CFL-reachability., , , , , и . PLDI, стр. 196-210. ACM, (2018)Metamorphic Object Insertion for Testing Object Detection Systems., и . ASE, стр. 1053-1065. IEEE, (2020)Deep differential testing of JVM implementations., , и . ICSE, стр. 1257-1268. IEEE / ACM, (2019)Hunting for bugs in code coverage tools via randomized differential testing., , , , , , и . ICSE, стр. 488-498. IEEE / ACM, (2019)Practical GUI testing of Android applications via model abstraction and refinement., , , , , , , , и . ICSE, стр. 269-280. IEEE / ACM, (2019)