Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Metrics to identify where object-oriented program comprehension benefits from the runtime structure., , and . WETSoM, page 42-48. IEEE Computer Society, (2013)Is there value in reasoning about security at the architectural level: a comparative evaluation., , and . HotSoS, page 30. ACM, (2014)COVID-19: disease pathways and gene expression changes predict methylprednisolone can improve outcome in severe cases., , , , , , , , , and 1 other author(s). Bioinform., 37 (17): 2691-2698 (2021)Ownership Object Graphs with Dataflow Edges., and . WCRE, page 267-276. IEEE Computer Society, (2012)Abstract runtime structure for reasoning about security: poster., , , and . HotSoS, page 1-3. ACM, (2016)Comparative Evaluation of Architectural and Code-Level Approaches for Finding Security Vulnerabilities., , and . SIW@CCS, page 27-34. ACM, (2014)Finding architectural flaws in android apps is easy., and . SPLASH (Companion Volume), page 21-22. ACM, (2013)Partial Domain Comprehension in Software Evolution and Maintenance., , and . ICPC, page 13-22. IEEE Computer Society, (2008)Finding architectural flaws using constraints., and . ASE, page 334-344. IEEE, (2013)Object Graphs with Ownership Domains: An Empirical Study., and . Aliasing in Object-Oriented Programming, volume 7850 of Lecture Notes in Computer Science, Springer, (2013)