Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-Agnostic and Efficient Exploration of Numerical Congestion Control State Space of Real-World TCP Implementations., , , and . IEEE/ACM Trans. Netw., 29 (5): 1990-2004 (2021)Bringing white-box testing to Service Oriented Architectures through a Service Oriented Approach., , , and . J. Syst. Softw., 84 (4): 655-668 (2011)Characterizing User Responses to Failures in Aerial Autonomous Systems., , and . IEEE Robotics Autom. Lett., 5 (2): 1587-1594 (2020)Empirically driven SE research: state of the art and required maturity., and . ICSE, page 32. ACM, (2006)Monitoring Finite State Properties: Algorithmic Approaches and Their Relative Strengths., , and . RV, volume 7186 of Lecture Notes in Computer Science, page 381-395. Springer, (2011)Selecting a Cost-Effective Test Case Prioritization Technique., , , and . Softw. Qual. J., 12 (3): 185-210 (2004)DeepManeuver: Adversarial Test Generation for Trajectory Manipulation of Autonomous Vehicles., , and . IEEE Trans. Software Eng., 49 (10): 4496-4509 (October 2023)Supporting Controlled Experimentation with Testing Techniques: An Infrastructure and its Potential Impact., , and . Empirical Software Engineering, 10 (4): 405-435 (2005)Using assertions to help end-user programmers create dependable web macros., , , , , and . SIGSOFT FSE, page 124-134. ACM, (2008)Differential symbolic execution., , , and . SIGSOFT FSE, page 226-237. ACM, (2008)