Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specification and Runtime Verification of API Constraints on Interacting Objects., , , and . SEKE, page 101-106. Knowledge Systems Institute Graduate School, (2011)Constraint Violation Detection: A Fundamental Part of Software Cybernetics.. COMPSAC (2), page 139-142. IEEE Computer Society, (2005)0-7695-2413-3.A Visual Constraint Specifying Approach for Adaptive Software., , and . COMPSAC (2), page 252-257. IEEE Computer Society, (2006)0-7695-2655-1.A self-management approach for service developers of PaaS., , , , , and . SOSE, page 85-92. IEEE Computer Society, (2011)A Pattern-Based Constraint Description Approach for Web Services., , , , and . QSIC, page 60-69. IEEE Computer Society, (2007)A Hybrid Approach to Detecting Security Defects in Programs., , , , and . QSIC, page 1-10. IEEE Computer Society, (2009)Interceptor Based Constraint Violation Detection., and . ECBS, page 457-464. IEEE Computer Society, (2005)CodeR: Issue Resolving with Multi-Agent and Task Graphs., , , , , , , , , and 7 other author(s). CoRR, (2024)DecTrans: Person Re-identification with Multifaceted Part Features via Decomposed Transformer., , , and . PRCV (12), volume 14436 of Lecture Notes in Computer Science, page 29-42. Springer, (2023)SWE-bench-java: A GitHub Issue Resolving Benchmark for Java., , , , , , , , , and 10 other author(s). CoRR, (2024)