Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Program Debloating via Reinforcement Learning., , , and . ACM Conference on Computer and Communications Security, page 380-394. ACM, (2018)Design and implementation of sparse global analyses for C-like languages., , , , and . PLDI, page 229-238. ACM, (2012)Sound Non-Statistical Clustering of Static Analysis Alarms., , , , , and . ACM Trans. Program. Lang. Syst., 39 (4): 16:1-16:35 (2017)Sound Non-statistical Clustering of Static Analysis Alarms., , and . VMCAI, volume 7148 of Lecture Notes in Computer Science, page 299-314. Springer, (2012)Datalog Static Analysis in Secrecy., and . IEEE Access, (2022)Accelerating search-based program synthesis using learned probabilistic models., , , and . PLDI, page 436-449. ACM, (2018)Inductive Synthesis of Structurally Recursive Functional Programs from Non-recursive Expressions., and . Proc. ACM Program. Lang., 7 (POPL): 2048-2078 (January 2023)Optimizing Homomorphic Evaluation Circuits by Program Synthesis and Time-bounded Exhaustive Search., , , and . ACM Trans. Program. Lang. Syst., 45 (3): 16:1-16:37 (September 2023)Inductive Program Synthesis via Iterative Forward-Backward Abstract Interpretation., , and . CoRR, (2023)Extensions and Variations on Construction of Autoreplicators in Typogenetics., and . ECAL, volume 3630 of Lecture Notes in Computer Science, page 685-694. Springer, (2005)