Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research abstract for semantic detection in dynamic data feeds with incomplete specifications.. ICSE, page 733-734. ACM, (2002)Enabling automatic adaptation in systems with under-specified elements., , and . WOSS, page 55-60. ACM, (2002)Detection of data drift and outliers affecting machine learning model performance over time., , , , and . CoRR, (2020)Unveiling Safety Vulnerabilities of Large Language Models., , , , , , , and . CoRR, (2023)Automatic Generation of Attention Rules For Containment of Machine Learning Model Errors., , , and . CoRR, (2023)An Approach to Preserving Sufficient Correctness in Open Resource Coalitions., and . IWSSD, page 159-170. IEEE Computer Society, (2000)Automated substring hole analysis., , , , , , , and . ICSE Companion, page 203-206. IEEE, (2009)Code coverage analysis in practice for large systems., , , , , , and . ICSE, page 736-745. ACM, (2011)Advanced code coverage analysis using substring holes., , , , , , , and . ISSTA, page 37-46. ACM, (2009)SeeCode - A Code Review Plug-in for Eclipse., , and . Haifa Verification Conference, volume 5394 of Lecture Notes in Computer Science, page 205-209. Springer, (2008)