Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study on the Use of Static Analysis Tools in Open Source Embedded Software., , , , and . CoRR, (2023)Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors., , , , , , , and . CoRR, (2024)Regexes are Hard: Decision-making, Difficulties, and Risks in Programming Regular Expressions., , , , and . CoRR, (2023)Why aren't regular expressions a lingua franca? an empirical study on the re-use and portability of regular expressions., , , , and . ESEC/SIGSOFT FSE, page 443-454. ACM, (2019)EdgeWise: A Better Stream Processing Engine for the Edge., , , and . USENIX Annual Technical Conference, page 929-946. USENIX Association, (2019)Low-Power Multi-Camera Object Re-Identification using Hierarchical Neural Networks., , , , , , and . ISLPED, page 1-6. IEEE, (2021)The Case of the Poisoned Event Handler: Weaknesses in the Node.js Event-Driven Architecture., , and . EUROSEC, page 8:1-8:6. ACM, (2017)Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement Study., , , and . ASE, page 427-439. IEEE, (2019)An Exploratory Study on Upper-Level Computing Students' Use of Large Language Models as Tools in a Semester-Long Project., , , , and . CoRR, (2024)An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security., and . CoRR, (2024)