Author of the publication

Crying Wolf and Meaning It: Reducing False Alarms in Monitoring of Sporadic Operations through POD-Monitor.

, , , , , , , and . COUFLESS@ICSE, page 69-75. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding and Handling Blockchain Uncertainties., , , , and . ICBC, volume 12404 of Lecture Notes in Computer Science, page 108-124. Springer, (2020)Object detection for graphical user interface: old fashioned or deep learning or a combination?, , , , , , and . ESEC/SIGSOFT FSE, page 1202-1214. ACM, (2020)A Process Adaptation Framework for Blockchain-Based Supply Chain Management., , , and . IEEE ICBC, page 1-9. IEEE, (2021)Towards a roadmap on software engineering for responsible AI., , , , and . CAIN, page 101-112. ACM, (2022)EthDrive: A Peer-to-Peer Data Storage with Provenance., , and . CAiSE-Forum-DC, volume 1848 of CEUR Workshop Proceedings, page 25-32. CEUR-WS.org, (2017)Analysis of Privacy Patterns from An Architectural Perspective., , , and . ICSA Companion, page 60-67. IEEE, (2022)API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph., , , , , , and . ASE, page 461-472. IEEE, (2020)SoapOperaTG: A Tool for System Knowledge Graph Based Soap Opera Test Generation., , , , , and . ICSE Companion, page 51-54. IEEE, (2023)Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial Code., , , , , and . ASE, page 79:1-79:13. ACM, (2022)Unveiling the Tricks: Automated Detection of Dark Patterns in Mobile Applications., , , , , , and . UIST, page 114:1-114:20. ACM, (2023)