Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

libmask: Protecting browser JIT engines from the devil in the constants., , and . PST, page 301-308. IEEE, (2016)ViViD: a variability-based tool for synthesizing video sequences., , , , and . SPLC Workshops, page 143-147. ACM, (2014)Leveraging Software Product Lines Engineering in the development of external DSLs: A systematic literature review., , , , and . Comput. Lang. Syst. Struct., (2016)Automatic Specialization of Third-Party Java Dependencies., , , and . CoRR, (2023)Observability and chaos engineering on system calls for containerized applications in Docker., , , , and . Future Gener. Comput. Syst., (2021)A longitudinal analysis of bloated Java dependencies., , and . ESEC/SIGSOFT FSE, page 1021-1031. ACM, (2021)A UML-Based Concept for High Concurrency: The Real-Time Object., , , and . ISORC, page 64-67. IEEE Computer Society, (2004)Model transformation testing: oracle issue., , and . ICST Workshops, page 105-112. IEEE Computer Society, (2008)Searching the Boundaries of a Modeling Space to Test Metamodels., , and . ICST, page 131-140. IEEE Computer Society, (2012)Descartes: a PITest engine to detect pseudo-tested methods: tool demonstration., , and . ASE, page 908-911. ACM, (2018)