Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Checking enforcement of integrity constraints in database applications based on code patterns., , , , , , and . Journal of Systems and Software, 84 (12): 2253-2264 (2011)TranStrL: An automatic need-to-translate string locator for software internationalization., , , , and . ICSE, page 555-558. IEEE, (2009)Matching dependence-related queries in the system dependence graph., , , , , and . ASE, page 457-466. ACM, (2010)Protecting remote controlling apps of smart-home-oriented IOT devices., , and . ICSE (Companion Volume), page 212-213. ACM, (2018)IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps., , , , and . ICSE, page 257-268. IEEE / ACM, (2019)How reliable is the crowdsourced knowledge of security implementation?, , , , and . ICSE, page 536-547. IEEE / ACM, (2019)Active Store Window: Enabling Far Store-Load Forwarding with Scalability and Complexity-Efficiency., , , , , and . J. Comput. Sci. Technol., 27 (4): 769-780 (2012)Extracting Paraphrases of Technical Terms from Noisy Parallel Software Corpora., , , , and . ACL/IJCNLP (Short Papers), page 197-200. The Association for Computer Linguistics, (2009)Approach for malware identification using dynamic behaviour and outcome triggering., , , , and . IET Information Security, 8 (2): 140-151 (2014)CGA: Combining cluster analysis with genetic algorithm for regression suite reduction of microprocessors., , , , and . SoCC, page 207-212. IEEE, (2011)