Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cyberinfrastructure for BigData Transportation Engineering., , and . CoRR, (2018)On Accelerating Source Code Analysis at Massive Scale., and . IEEE Trans. Software Eng., 44 (7): 669-688 (2018)SLEDE: event-based specification of sensor network security protocols., and . ACM SIGSOFT Softw. Eng. Notes, 31 (6): 1-2 (2006)Modularizing crosscutting concerns with ptolemy., , , , , , and . OOPSLA Companion, page 31-32. ACM, (2011)An Empirical Study on the Bugs Found while Reusing Pre-trained Natural Language Processing Models., , , , and . CoRR, (2022)Identifying Classes Susceptible to Adversarial Attacks., , , and . CoRR, (2019)Boa: a language and infrastructure for analyzing ultra-large-scale software repositories., , , and . ICSE, page 422-431. IEEE Computer Society, (2013)Predictive thread-to-core assignment on a heterogeneous multi-core processor., , and . PLOS@SOSP, page 7:1-7:5. ACM, (2007)Inferring Behavioral Specifications from Large-scale Repositories by Leveraging Collective Intelligence., , , and . ICSE (2), page 579-582. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Building scalable software systems in the multicore era.. FoSER, page 293-298. ACM, (2010)