Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusted Software Repair for System Resiliency., , , , and . DSN Workshops, page 238-241. IEEE Computer Society, (2016)Modeling Internet-Scale Policies for Cleaning up Malware, , , , and . CoRR, (2012)Internet Topology over Time, , , and . CoRR, (2012)Connecting Program Synthesis and Reachability: Automatic Program Repair using Test-Input Generation., , , and . CoRR, (2019)Using Dynamic Analysis to Generate Disjunctive Invariants., , , and . CoRR, (2019)DIG: A Dynamic Invariant Generator for Polynomial and Array Invariants., , , and . ACM Trans. Softw. Eng. Methodol., 23 (4): 30:1-30:30 (2014)Volatility and spatial distribution of resources determine ant foraging strategies., , , and . ECAL, page 256-263. MIT Press, (2015)The Performance of Genetic Algorithms on Walsh Polynomials: Some Anomalous Results and Their Explanation., and . ICGA, page 182-189. Morgan Kaufmann, (1991)Coverage and Generalization in an Artificial Immune System., , , and . GECCO, page 3-10. Morgan Kaufmann, (2002)Moving Target Defenses in the Helix Self-Regenerative Architecture., , , , , , , and . Moving Target Defense, volume 100 of Advances in Information Security, Springer, (2013)