Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unified Lattice Model and Framework for Purity Analyses., , , , and . SE/SWM, volume P-292 of LNI, page 51-52. GI, (2019)Modular collaborative program analysis in OPAL., , , , and . ESEC/SIGSOFT FSE, page 184-196. ACM, (2020)Getting to know you: towards a capability model for Java., , , and . Software Engineering, volume P-252 of LNI, page 59-60. GI, (2016)SePass: Semantic Password Guessing Using k-nn Similarity Search in Word Embeddings., , , , and . ADMA (2), volume 13726 of Lecture Notes in Computer Science, page 28-42. Springer, (2022)Systematic evaluation of the unsoundness of call graph construction algorithms for Java., , , and . ISSTA/ECOOP Workshops, page 107-112. ACM, (2018)Encoding the Java Virtual Machine's Instruction Set., and . Bytecode@ETAPS, volume 264 of Electronic Notes in Theoretical Computer Science, page 35-50. Elsevier, (2010)Lattice based modularization of static analyses., , , , , and . ISSTA/ECOOP Workshops, page 113-118. ACM, (2018)A dataset of parametric cryptographic misuses., , , , and . MSR, page 96-100. IEEE / ACM, (2019)TACAI: an intermediate representation based on abstract interpretation., , , , , and . SOAP@PLDI, page 2-7. ACM, (2020)A programming model for semi-implicit parallelization of static analyses., , , , , , and . ISSTA, page 428-439. ACM, (2020)