Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theia: Visual Signatures for Problem Diagnosis in Large Hadoop Clusters., , , , and . login Usenix Mag., (2013)Poster Abstract: BUFS: Towards Bottom-Up Foundational Security for Software in the Internet-of-Things., , and . SEC, page 107-108. IEEE Computer Society, (2016)Modularity-based community detection in large networks: An empirical evaluation., , and . ICIA, page 1131-1136. IEEE, (2014)MapTracker: Tracking with Strided Memory Fusion for Consistent Vector HD Mapping., , , , and . CoRR, (2024)Empower Text-Attributed Graphs Learning with Large Language Models (LLMs)., , , , , and . CoRR, (2023)AUSPICE-R: Automatic Safety-Property Proofs for Realistic Features in Machine Code., , , and . APLAS, volume 10017 of Lecture Notes in Computer Science, page 42-62. (2016)Automated text categorization by generalized kernel machines., , and . ICIA, page 376-381. IEEE, (2014)Visual, Log-Based Causal Tracing for Performance Debugging of MapReduce Systems., , , and . ICDCS, page 795-806. IEEE Computer Society, (2010)AUSPICE: Automatic Safety Property Verification for Unmodified Executables., , , and . VSTTE, volume 9593 of Lecture Notes in Computer Science, page 202-222. Springer, (2015)Program Repair by Fuzzing over Patch and Input Space., , , , and . CoRR, (2023)