Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a practical deployment of privacy-preserving crowd-sensing tasks., , , , , and . Middleware (Posters & Demos), page 43-44. ACM, (2014)Evaluating the Impact of Java Virtual Machines on Energy Consumption., , , , and . ESEM, page 15:1-15:11. ACM, (2021)Leveraging feature models to configure virtual appliances., , and . CloudCP@EuroSys, page 2:1-2:6. ACM, (2012)Fostering the Diversity of Exploratory Testing in Web Applications., , , , and . ICST, page 164-174. IEEE, (2020)Taming Energy Consumption Variations In Systems Benchmarking., , , , , and . ICPE, page 36-47. ACM, (2020)On the survival of Android code smells in the wild., , and . MOBILESoft@ICSE, page 87-98. IEEE / ACM, (2019)AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service., , , and . Proc. Priv. Enhancing Technol., 2019 (2): 291-305 (2019)An iterative technique to identify browser fingerprinting scripts., , , and . CoRR, (2021)Can We Spot Energy Regressions using Developers Tests?, , and . CoRR, (2021)Erratum: Leveraging Flexible Tree Matching to repair broken locators in web automation scripts., , , and . Inf. Softw. Technol., (2022)