Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring., , and . ECOOP, volume 4609 of Lecture Notes in Computer Science, page 525-549. Springer, (2007)Gamifying static analysis., and . ESEC/SIGSOFT FSE, page 714-718. ACM, (2018)IDE Support for Cloud-Based Static Analyses., and . Software Engineering, volume P-320 of LNI, page 61-63. Gesellschaft für Informatik e.V., (2022)A lightweight LTL runtime verification tool for java.. OOPSLA Companion, page 306-307. ACM, (2004)How to build the perfect Swiss army knife, and keep it sharp?: Challenges for the soot program-analysis framework in the light of past, current and future demands.. SOAP@PLDI, page 6:1. ACM, (2014)Efficient hybrid typestate analysis by determining continuation-equivalent states.. ICSE (1), page 5-14. ACM, (2010)State of the systems security.. ICSE (Companion Volume), page 550-551. ACM, (2018)Model Checking the Information Flow Security of Real-Time Systems., , and . ESSoS, volume 10953 of Lecture Notes in Computer Science, page 27-43. Springer, (2018)Avoiding Infinite Recursion with Stratified Aspects., , and . NODe/GSEM, volume P-88 of LNI, page 49-64. GI, (2006)Self-adaptive static analysis.. ICSE (NIER), page 45-48. ACM, (2018)