Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring and exploiting the correlations between bug-inducing and bug-fixing commits., , , , , , and . ESEC/SIGSOFT FSE, page 326-337. ACM, (2019)Detecting and analyzing insecure component usage., and . SIGSOFT FSE, page 5. ACM, (2012)Calling-to-reference context translation via constraint-guided CFL-reachability., , , , , and . PLDI, page 196-210. ACM, (2018)Validating JIT Compilers via Compilation Space Exploration., , , and . SOSP, page 66-79. ACM, (2023)Does Deliberately Failing Improve Learning in Introductory Computer Science?, , , and . EC-TEL, volume 13450 of Lecture Notes in Computer Science, page 608-614. Springer, (2022)Algot: An Educational Programming Language with Human-Intuitive Visual Syntax., and . VL/HCC, page 1-5. IEEE, (2021)Metamorphic Object Insertion for Testing Object Detection Systems., and . ASE, page 1053-1065. IEEE, (2020)Deep differential testing of JVM implementations., , and . ICSE, page 1257-1268. IEEE / ACM, (2019)Hunting for bugs in code coverage tools via randomized differential testing., , , , , , and . ICSE, page 488-498. IEEE / ACM, (2019)Practical GUI testing of Android applications via model abstraction and refinement., , , , , , , , and . ICSE, page 269-280. IEEE / ACM, (2019)