Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fex: Assisted Identification of Domain Features from C Programs., , and . SCAM, page 170-180. IEEE, (2021)Evaluating and improving transformers pre-trained on ASTs for Code Completion., , and . SANER, page 834-844. IEEE, (2023)Copy and paste redeemed., and . Software Engineering, volume P-252 of LNI, page 61-62. GI, (2016)jGuard: Programming Misuse-Resilient APIs., , , and . SLE, page 161-174. ACM, (2022)Towards Code Generation from BDD Test Case Specifications: A Vision., , , , , and . CAIN, page 139-144. IEEE, (2023)Introducing FUM: A Framework for API Usage Constraint and Misuse Classification., , , and . Software Engineering, volume P-332 of LNI, page 105-106. Gesellschaft für Informatik e.V., (2023)BRAID: an API recommender supporting implicit user feedback., , , , , and . ESEC/SIGSOFT FSE, page 1510-1514. ACM, (2021)Exploring the Use of Static and Dynamic Analysis to Improve the Performance of the Mining Sandbox Approach for Android Malware Identification., , , , , , , and . CoRR, (2021)Exploring the use of static and dynamic analysis to improve the performance of the mining sandbox approach for android malware identification., , , , , , , and . J. Syst. Softw., (2022)Dealing with Variability in API Misuse Specification., , , , and . ECOOP, volume 194 of LIPIcs, page 19:1-19:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)