Author of the publication

Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation.

, , , , , and . RE, page 113-122. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proteus: computing disjunctive loop summary via path dependency analysis., , , , and . SIGSOFT FSE, page 61-72. ACM, (2016)Are your sites down? Requirements-driven self-tuning for the survivability of Web systems., , , and . RE, page 219-228. IEEE Computer Society, (2011)Loopster: static loop termination analysis., , , , , and . ESEC/SIGSOFT FSE, page 84-94. ACM, (2017)Leopard: identifying vulnerable code for vulnerability assessment through program metrics., , , , , , and . ICSE, page 60-71. IEEE / ACM, (2019)Blockchain-Based Implementation for Financial Product Management., , and . ITNAC, page 1-3. IEEE Computer Society, (2018)DeepLink: Recovering issue-commit links based on deep learning., , , and . Journal of Systems and Software, (2019)Survivability-oriented self-tuning of web systems., , , and . WWW (Companion Volume), page 23-24. ACM, (2011)Superion: grammar-aware greybox fuzzing., , , and . ICSE, page 724-735. IEEE / ACM, (2019)Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem., , , , , and . CoRR, (2022)Hawkeye: Towards a Desired Directed Grey-box Fuzzer., , , , , , and . ACM Conference on Computer and Communications Security, page 2095-2108. ACM, (2018)