Publications
Publications by categories in reversed chronological order. generated by jekyll-scholar.
2025
-
CASCONEfficient Pointer Analysis via Def-Use Graph PruningIn In Proceedings of the 35th IEEE International Conference on Collaborative Advances in Software and Computing (CASCON ’25), Nov 2025, 2025
-
LEARNERA Friend or a Foe? Evaluating ChatGPT’s Impact on Students’ Computational Thinking SkillsIn Proceedings of International Workshop on evaLuation and assEssment in softwARe eNgineers’ Education and tRaining (LEARNER 2025), Apr 2025
2024
2023
2022
-
CASCONA Human-in-the-loop Approach to Generate Annotation Usage Rules: A Case Study with MicroProfileIn Annual International Conference on Computer Science and Software Engineering (CASCON ’22), May 2022
2021
-
CASCONU Can’t Inline This!In International Conference on Computer Science and Software Engineering, Nov 2021
-
PATENTAssessment of the Benefit of Post-Inlining Program Transformation in Inlining DecisionsJun 2021US Patent 11,157,252
-
PATENT
2020
2019
2018
2017
-
CASCONSoftware Variability Through C++ Static Polymorphsim: A Case Study of Challenges and Open Problems in Eclipse OMRIn Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering (CASCON ’17) – Position Paper, May 2017
-
FSPA Case for Better Integration of Host and Target Compilation When Using OpenCL for FPGAsIn International Workshop on FPGAs for Software Programmers, Aug 2017
2016
2015
-
ONWARDTowards Secure Integration of Cryptographic SoftwareIn Proceedings of the SIGPLAN Symposium on New Ideas in Programming and Reflections on Software at SPLASH (ONWARD ’15), Pittsburg, PA, USA, May 2015(Acceptance Rate: 17/37 = 35%)
-
ECOOPThe Love/Hate Relationship with the C Preprocessor: An Interview StudyIn Proceedings of the 29th European Conference on Object-Oriented Programming (ECOOP ’15), May 2015(Acceptance Rate: 31/136 = 23%)
-
TSEWhere do configuration constraints stem from? An extraction approach and an empirical studyIEEE Transactions on Software Engineering (TSE), May 2015
-
RELENGExtracting Configuration Knowledge from Build Files with Symbolic Analysis, Florence, Italy, May 2015
-
TOSEMType-Based Call Graph Construction Algorithms for ScalaACM Transactions on Software Engineering and Methodology, May 2015
2014
-
ICSEMining configuration constraints: Static analyses and empirical resultsIn Proceedings of the 36th International Conference on Software Engineering (ICSE ’14), Hyderabad, India, May 2014(Acceptance Rate: 99/495 = 20%)
-
ECOOPConstructing Call Graphs of Scala ProgramsIn European Conference on Object-Oriented Programming, May 2014
2013
-
MSRThe MSR cookbook: Mining a decade of researchIn Proceedings of the 10th Working Conference on Mining Software Repositories (MSR ’13), San Francisco, CA, USA, May 2013(Acceptance Rate: 31/81 = 38%)
-
MSRLinux variability anomalies: What causes them and how do they get fixed?In Proceedings of the 10th Working Conference on Mining Software Repositories (MSR ’13), San Francisco, CA, USA, May 2013(Acceptance Rate: 31/81 = 38%)
-
ICSEA study of variability spaces in Open Source Software, San Francisco, CA, USA, May 2013(Acceptance Rate: 19/35 = 54%)
-
The Linux kernel: A case study of build system variabilityJournal of Software: Evolution and Process (JSEP), May 2013
-
ECOOPAverroes: Whole-Program Analysis without the Whole ProgramIn European Conference on Object-Oriented Programming, May 2013
2012
-
JSEPMining Kbuild to detect variability anomalies in LinuxIn Proceedings of the 16th European Conference on Software Maintenance and Reengineering (CSMR ’12), May 2012(Acceptance Rate: 30/108 = 27%). Invited for a special issue of JSEP
-
ECOOPApplication-Only Call Graph ConstructionIn European Conference on Object-Oriented Programming, May 2012
2011
-
WCREMake it or break it: Mining anomalies from Linux KbuildIn Proceedings of the 18th Working Conference on Reverse Engineering (WCRE ’11), May 2011(Acceptance Rate: 27/104 = 26%)
2010
-
CSMRDoes the past say it all? Using history to predict change sets in a CMDBIn Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR ’10), May 2010(Acceptance Rate: 21/80 = 26%)
2009
-
CASCONDRACA: Decision support for root cause analysis and change impact analysis for CMDBsIn Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research (CASCON ’09), Ontario, Canada, May 2009(Acceptance Rate: 22/88 = 25%). Best Paper Award
-
GIISP2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacksIn Global Information Infrastructure Symposium, May 2009
-
GIISApplying Kernel Methods to Anomaly-based Intrusion Detection SystemsIn Global Information Infrastructure Symposium, May 2009
2008
-
IJCSNSA Java-Based programming language support of location management in pervasive systemsInternational Journal of Computer Science and Network Security (IJCSNS), May 2008