From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Bayesian Approach to Privacy Enforcement in Smartphones., и . USENIX Security Symposium, стр. 175-190. USENIX Association, (2014)Lifting model transformations to product lines., , , , и . ICSE, стр. 117-128. ACM, (2014)eTainter: detecting gas-related vulnerabilities in smart contracts., , и . ISSTA, стр. 728-739. ACM, (2022)Kuber: Cost-Efficient Microservice Deployment Planner., , и . SANER, стр. 252-262. IEEE, (2022)Precise semantic history slicing through dynamic delta refinement., , , и . ASE, стр. 495-506. ACM, (2016)Client-specific equivalence checking., , , и . ASE, стр. 441-451. ACM, (2018)AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities., , и . ICSE, стр. 945-956. IEEE, (2023)5th International Workshop on Product LinE Approaches in Software Engineering PLE for a Sustainable Society (PLEASE 2015)., , , и . ICSE (2), стр. 989-990. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).AndroR2: A Dataset of Manually Reproduced Bug Reports for Android Applications., , , , , , , и . CoRR, (2021)An Empirical Investigation into the Reproduction of Bug Reports for Android Apps., , , , , и . SANER, стр. 321-322. IEEE, (2022)