Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated detection of api refactorings in libraries., , and . ASE, page 377-380. ACM, (2007)Improving mobile application security via bridging user expectations and application behaviors., , , , and . HotSoS, page 32. ACM, (2014)Constructing coding duels in Pex4Fun and code hunt., , , and . ISSTA, page 445-448. ACM, (2014)Mining software engineering data., and . ICSE (2), page 503-504. ACM, (2010)978-1-60558-719-6.An embedded storage framework abstracting each raw flash device as an MTD., , and . SYSTOR, page 7:1-7:11. ACM, (2015)An approach to detecting duplicate bug reports using natural language and execution information., , , , and . ICSE, page 461-470. ACM, (2008)DyTa: dynamic symbolic execution guided with static verification results., , , and . ICSE, page 992-994. ACM, (2011)Construct MD5 Collisions Using Just A Single Block Of Message., and . IACR Cryptology ePrint Archive, (2010)Retrofitting Unit Tests for Parameterized Unit Testing., , , , and . FASE, volume 6603 of Lecture Notes in Computer Science, page 294-309. Springer, (2011)ReWAP: Reducing Redundant Transfers for Mobile Web Browsing via App-Specific Resource Packaging., , , , , and . IEEE Trans. Mob. Comput., 16 (9): 2625-2638 (2017)