Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Understanding Provenance in Industry., and . CoRR, (2023)Technical Lag of Dependencies in Major Package Managers., , , and . APSEC, page 228-237. IEEE, (2020)Evil Pickles: DoS Attacks Based on Object-Graph Engineering., , , , and . ECOOP, volume 74 of LIPIcs, page 10:1-10:32. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Take - A Rule Compiler for Derivation Rules., , and . RuleML, volume 4824 of Lecture Notes in Computer Science, page 134-148. Springer, (2007)On the Existence of High-Impact Refactoring Opportunities in Programs., , , and . ACSC, volume 122 of CRPIT, page 37-48. Australian Computer Society, (2012)An Approach to Numeric Refinement in Description Logic Learning for Learning Activities Duration in Smart Homes., , , and . AAAI Workshop: Space, Time, and Ambient Intelligence, volume WS-13-14 of AAAI Technical Report, AAAI, (2013)On Retrofitting Provenance for Transparent and Fair Software - Drivers and Challenges., , and . FairWare, page 14-21. IEEE, (2023)Caught in the Web: DoS Vulnerabilities in Parsers for Structured Data., , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 67-85. Springer, (2021)GHTraffic: A Dataset for Reproducible Research in Service-Oriented Computing., , , and . ICWS, page 123-130. IEEE, (2018)On the Use of Static Analysis to Safeguard Recursive Dependency Resolution., and . EUROMICRO-SEAA, page 166-173. IEEE Computer Society, (2014)