Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A spoonful of DevOps helps the GI go down., , , , , , and . GI@ICSE, page 35-36. ACM, (2018)The Surprising Creativity of Digital Evolution: A Collection of Anecdotes from the Evolutionary Computation and Artificial Life Research Communities., , , , , , , , , and 43 other author(s). Artif. Life, 26 (2): 274-306 (2020)Software mutational robustness, , , , and . 15 (3): 281--312 (2014)Automated Customized Bug-Benchmark Generation., , , , , , , , and . SCAM, page 103-114. IEEE, (2019)A Multi-Language Computing Environment for Literate Programming and Reproducible Research, , , and . Journal of Statistical Software, 46 (3): 1--24 (January 2012)Active Documents with Org-Mode., and . Comput. Sci. Eng., 13 (3): 66-73 (2011)A Broad Comparative Evaluation of x86-64 Binary Rewriters., , and . CSET @ USENIX Security Symposium, page 129-144. ACM, (2022)MuSynth: Program Synthesis via Code Reuse and Code Manipulation., , , and . SSBSE, volume 10452 of Lecture Notes in Computer Science, page 117-123. Springer, (2017)Handbook on Statistical Disclosure Control (Version 1.1). ESSNET SDC Project, , , , , , , , and . (2009)Datalog Disassembly., and . USENIX Security Symposium, page 1075-1092. USENIX Association, (2020)