Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maintaining the health of software monitors., and . Innov. Syst. Softw. Eng., 9 (4): 257-269 (2013)Computing and visualizing the impact of change with Java PathFinder extensions., , and . ACM SIGSOFT Softw. Eng. Notes, 37 (6): 1-5 (2012)Combining unit-level symbolic execution and system-level concrete execution for testing NASA software., , , , , , and . ISSTA, page 15-26. ACM, (2008)Exact Heap Summaries for Symbolic Execution., , , and . VMCAI, volume 9583 of Lecture Notes in Computer Science, page 206-225. Springer, (2016)Generalized Abstract Symbolic Summaries for Differencing Heap-manipulating Programs., and . NASA Formal Methods, volume NASA/CP-2009-215407 of NASA Conference Proceedings, page 46-55. (2009)Analyzing relationships between closed labs and course activities in CS1., , , , and . ITiCSE, page 183-187. ACM, (2005)Development context driven change awareness and analysis framework., , , , and . ICSE Companion, page 404-407. ACM, (2014)Controlling factors in evaluating path-sensitive error detection techniques., , and . SIGSOFT FSE, page 92-104. ACM, (2006)Differential symbolic execution., , , and . SIGSOFT FSE, page 226-237. ACM, (2008)Closed laboratories with embedded instructional research design for CS1., , , , and . SIGCSE, page 297-301. ACM, (2005)