Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Wingman for Virtual Appliances., , , and . RV, volume 10548 of Lecture Notes in Computer Science, page 390-399. Springer, (2017)Weir: a streaming language for performance analysis., , , and . ACM SIGOPS Oper. Syst. Rev., 48 (1): 65-70 (2014)Powder: Platform for Open Wireless Data-driven Experimental Research., , , , , , , , , and 13 other author(s). Comput. Networks, (2021)An Experimentation Workbench for Replayable Networking Research., , and . NSDI, USENIX, (2007)Test-case reduction for C compiler bugs., , , , , and . PLDI, page 335-346. ACM, (2012)Potassium: penetration testing as a service., , , , , , , and . SoCC, page 30-42. ACM, (2015)Efficient type and memory safety for tiny embedded systems., , , and . PLOS, page 6. ACM, (2006)Dynamic CPU Management for Real-Time, Middleware-Based Systems., , , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 286-295. IEEE Computer Society, (2004)Help, help, i'm being suppressed! The significance of suppressors in software testing., , , , , and . ISSRE, page 390-399. IEEE Computer Society, (2013)Using Deduplicating Storage for Efficient Disk Image Deployment., , , and . EAI Endorsed Trans. Scalable Inf. Syst., 2 (6): e1 (2015)