Author of the publication

Statically checking API protocol conformance with mined multi-object specifications.

, , , and . ICSE, page 925-935. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bita: Coverage-guided, automatic testing of actor programs, , , and . 2013 28th IEEE/ACM International Conference on Automated Software Engineering, page 114-124. (November 2013)Systematic black-box analysis of collaborative web applications., , and . PLDI, page 171-184. ACM, (2017)Interactive metamorphic testing of debuggers., , and . ISSTA, page 273-283. ACM, (2019)Performance Issues and Optimizations in JavaScript: An Empirical Study., and . Software Engineering, volume P-267 of LNI, page 63. GI, (2017)Everything Old is New Again: Binary Security of WebAssembly., , and . USENIX Security Symposium, page 217-234. USENIX Association, (2020)NL2Type: inferring JavaScript function types from natural language information., , and . ICSE, page 304-315. IEEE / ACM, (2019)MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform., and . ICSE, page 2413-2424. IEEE, (2023)VULGEN: Realistic Vulnerability Generation Via Pattern Mining and Deep Learning., , , , and . ICSE, page 2527-2539. IEEE, (2023)Resource Usage and Optimization Opportunities in Workflows of GitHub Actions., and . ICSE, page 25:1-25:12. ACM, (2024)DyPyBench: A Benchmark of Executable Python Software., , and . Proc. ACM Softw. Eng., 1 (FSE): 338-358 (2024)