Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Just-in-time code duplicates extraction., , , , , , , , , and . Inf. Softw. Technol., (June 2023)Scaling up Superoptimization., , , and . ASPLOS, page 297-310. ACM, (2016)AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE., , , , , , , , , and . ASE, page 152:1-152:4. ACM, (2022)Efficient ResNets: Residual Network Design., , and . CoRR, (2023)Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks., , and . AsiaCCS, page 173-185. ACM, (2018)GreenThumb: superoptimizer construction framework., , , and . CC, page 261-262. ACM, (2016)Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure., , , and . CODASPY, page 35-45. ACM, (2017)Satisfiability modulo abstraction for separation logic with linked lists., , and . SPIN, page 58-67. ACM, (2014)There's Plenty of Room at the Bottom: Analyzing and Verifying Machine Code., , , , and . CAV, volume 6174 of Lecture Notes in Computer Science, page 41-56. Springer, (2010)Directed Proof Generation for Machine Code., , , , , , , and . CAV, volume 6174 of Lecture Notes in Computer Science, page 288-305. Springer, (2010)