Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Black Box: An Alternative Mechanism for Failure Analysis., and . ISSRE, page 365-376. IEEE Computer Society, (2000)An Empirical Study of Tracing Techniques from a Failure Analysis Perspective., and . ISSRE, page 280-294. IEEE Computer Society, (2002)Investigation of Communicative Flight Paths for Small Unmanned Aerial Systems * This work was supported by NSF NRI 1638099., , , , and . ICRA, page 602-609. IEEE, (2018)How developers search for code: a case study., , and . ESEC/SIGSOFT FSE, page 191-201. ACM, (2015)Model-Agnostic and Efficient Exploration of Numerical State Space of Real-World TCP Congestion Control Implementations., , , and . NSDI, page 719-734. USENIX Association, (2019)Efficient systematic testing of network protocols with temporal uncertain events., , , , and . INFOCOM, page 604-612. IEEE, (2019)Monitoring Finite State Properties: Algorithmic Approaches and Their Relative Strengths., , and . RV, volume 7186 of Lecture Notes in Computer Science, page 381-395. Springer, (2011)Empirically driven SE research: state of the art and required maturity., and . ICSE, page 32. ACM, (2006)The first workshop on end-user software engineering., and . ICSE, page 698. ACM, (2005)Detecting problematic message sequences and frequencies in distributed systems., , and . OOPSLA, page 915-926. ACM, (2012)