Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Back to the Future: A Framework for Automatic Malware Removal and System Repair, , , , and . CSE-2005-6. University of California, Davis, (2005)Reusing debugging knowledge via trace-based bug search., , , and . OOPSLA, page 927-942. ACM, (2012)Does Deliberately Failing Improve Learning in Introductory Computer Science?, , , and . EC-TEL, volume 13450 of Lecture Notes in Computer Science, page 608-614. Springer, (2022)Detecting and analyzing insecure component usage., and . SIGSOFT FSE, page 5. ACM, (2012)Exploring and exploiting the correlations between bug-inducing and bug-fixing commits., , , , , , and . ESEC/SIGSOFT FSE, page 326-337. ACM, (2019)Calling-to-reference context translation via constraint-guided CFL-reachability., , , , , and . PLDI, page 196-210. ACM, (2018)Validating JIT Compilers via Compilation Space Exploration., , , and . SOSP, page 66-79. ACM, (2023)Metamorphic Object Insertion for Testing Object Detection Systems., and . ASE, page 1053-1065. IEEE, (2020)Testing Machine Translation via Referential Transparency., , and . ICSE, page 410-422. IEEE, (2021)Practical GUI testing of Android applications via model abstraction and refinement., , , , , , , , and . ICSE, page 269-280. IEEE / ACM, (2019)