Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the correctness of electronic documents: studying, finding, and localizing inconsistency bugs in PDF readers and files., , , , and . Empirical Software Engineering, 23 (6): 3187-3220 (2018)Sequential Human Activity Recognition Based on Deep Convolutional Network and Extreme Learning Machine Using Wearable Sensors., , , , , and . J. Sensors, (2018)ElemCor: accurate data analysis and enrichment calculation for high-resolution LC-MS stable isotope labeling experiments., , , , , , , and . BMC Bioinformatics, 20 (1): 89:1-89:9 (2019)Bit-split string-matching engines for intrusion detection and prevention., , and . TACO, 3 (1): 3-34 (2006)ENCORE: Ensemble Learning using Convolution Neural Machine Translation for Automatic Program Repair., , , , and . CoRR, (2019)Automatically Extracting Web API Specifications from HTML Documentation., , , , and . CoRR, (2018)CRADLE: cross-backend validation to detect and localize bugs in deep learning libraries., , , and . ICSE, page 1027-1038. IEEE / ACM, (2019)Bugram: bug detection with n-gram language models., , , and . ASE, page 708-719. ACM, (2016)Automatic model generation from documentation for Java API functions., , , , , , and . ICSE, page 380-391. ACM, (2016)A High Throughput String Matching Architecture for Intrusion Detection and Prevention., and . ISCA, page 112-122. IEEE Computer Society, (2005)