Author of the publication

Checking Compliance to Coding Standards for x86 Executables.

, , , , and . UIC/ATC Workshops, page 449-455. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Fault Localization Approach Using Feedback., , , and . IEICE Trans. Inf. Syst., 95-D (9): 2247-2257 (2012)Finding related events for specification mining., , , , and . ISSRE (Supplemental Proceedings), page 1-2. IEEE Computer Society, (2013)The strength of random search on automated program repair., , , , and . ICSE, page 254-265. ACM, (2014)Checking Compliance to Coding Standards for x86 Executables., , , , and . UIC/ATC Workshops, page 449-455. IEEE Computer Society, (2010)Leveraging specifications of subcomponents to mine precise specifications of composite components., , , and . WCRE, page 162-171. IEEE Computer Society, (2013)Empirical Effectiveness Evaluation of Spectra-Based Fault Localization on Automated Program Repair., , , , , and . COMPSAC, page 828-829. IEEE Computer Society, (2013)Effective Statistical Fault Localization Using Program Slices., , , and . COMPSAC, page 1-10. IEEE Computer Society, (2012)Resco: Automatic Collection of Leaked Resources., , , , and . IEICE Trans. Inf. Syst., 96-D (1): 28-39 (2013)Automatic recovery from resource exhaustion exceptions by collecting leaked resources., , , and . Journal of Zhejiang University - Science C, 15 (8): 622-635 (2014)Mining and checking web services behavior., , and . INDIN, page 1004-1009. IEEE, (2012)