Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CReN: a tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE., and . ETX, page 16-20. ACM, (2007)Actively comparing clones inside the code editor., , and . IWSC, page 9-16. ACM, (2010)An empirical analysis of the evolution of user-visible features in an integrated development environment., and . CASCON, page 122-135. ACM, (2009)Investigating the effects of frameworkdesign knowledge in example-based framework learning.. ICSM, page 37-46. IEEE Computer Society, (2008)Machine Learning at the Network Edge: A Survey., , , , , and . ACM Comput. Surv., 54 (8): 170:1-170:37 (2022)Fast Free-Text Authentication via Instance-Based Keystroke Dynamics., , , and . IEEE Trans. Biom. Behav. Identity Sci., 2 (4): 377-387 (2020)Stationary mobile behavioral biometrics: A survey., , and . Comput. Secur., (May 2023)Fast Continuous User Authentication Using Distance Metric Fusion of Free-Text Keystroke Data., , , , and . CVPR Workshops, page 2380-2388. Computer Vision Foundation / IEEE, (2019)FEMIR: a tool for recommending framework extension examples., , , and . ASE, page 967-972. IEEE Computer Society, (2017)Effects of text filtering on authentication performance of keystroke biometrics., , , and . WIFS, page 1-6. IEEE, (2016)