Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adopting Program Synthesis for Test Amplification., , and . BENEVOL, volume 2605 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Comparing smart contract vulnerability detection tools., , and . BENEVOL, volume 3567 of CEUR Workshop Proceedings, page 9-16. CEUR-WS.org, (2023)Challenges and Perils of Testing Database Manipulation Code., , , , and . CAiSE, volume 12751 of Lecture Notes in Computer Science, page 229-245. Springer, (2021)Small-Amp: Test Amplification in a Dynamically Typed Language., , , and . CoRR, (2021)Microservices in Practice: A Survey Study., , , , and . CoRR, (2018)Characterizing Bug Workflows in Mozilla Firefox., , , and . SBES, page 43-52. ACM, (2016)An exploratory study on solidity guards and ether exchange constructs., and . WETSEB@ICSE, page 1-8. ACM, (2022)How Developers Implement Property-Based Tests., , and . ICSME, page 380-384. IEEE, (2023)How Annotations are Used in Java: An Empirical Study., and . SEKE, page 426-431. Knowledge Systems Institute Graduate School, (2011)Refactoring Solidity Smart Contracts to Protect Against Reentrancy Exploits., , and . ISoLA (2), volume 13702 of Lecture Notes in Computer Science, page 324-344. Springer, (2022)