Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weir: a streaming language for performance analysis., , , and . ACM SIGOPS Oper. Syst. Rev., 48 (1): 65-70 (2014)A Wingman for Virtual Appliances., , , and . RV, volume 10548 of Lecture Notes in Computer Science, page 390-399. Springer, (2017)Powder: Platform for Open Wireless Data-driven Experimental Research., , , , , , , , , and 13 other author(s). Comput. Networks, (2021)An Experimentation Workbench for Replayable Networking Research., , and . NSDI, USENIX, (2007)Test-case reduction for C compiler bugs., , , , , and . PLDI, page 335-346. ACM, (2012)Dynamic CPU Management for Real-Time, Middleware-Based Systems., , , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 286-295. IEEE Computer Society, (2004)Efficient type and memory safety for tiny embedded systems., , , and . PLOS, page 6. ACM, (2006)Help, help, i'm being suppressed! The significance of suppressors in software testing., , , , , and . ISSRE, page 390-399. IEEE Computer Society, (2013)Potassium: penetration testing as a service., , , , , , , and . SoCC, page 30-42. ACM, (2015)Volatiles are miscompiled, and what to do about it., and . EMSOFT, page 255-264. ACM, (2008)