| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2007 | C | conf |
APSEC
|
| 2007 | C | conf |
APSEC
|
| 2007 | C | conf |
SEKE
|
| 2006 | A | conf |
ISSTA
|
| 2005 | C | conf |
SCAM
|
| 2004 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2004 | — | conf |
eTX
|
| 2004 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 2003 | — | conf |
World Conference on Information Security Education
|
| 2003 | — | conf |
Digital Rights Management Workshop
|
| 2003 | J | jnl |
Computer
|
| 2002 | A | conf |
ISSTA
|
| 2002 | — | conf |
PASTE
|
| 2000 | — | conf |
SIGSOFT FSE
|
| 1999 | — | conf |
ESEC / SIGSOFT FSE
|
| 1999 | A* | conf |
ICSE
|
| 1999 | — | conf |
PASTE
|
| 1999 | J | jnl |
ACM SIGSOFT Softw. Eng. Notes
|
| 1998 | — | conf |
A Conservative Data Flow Algorithm for Detecting All Pairs of Statement That May Happen in Parallel.
SIGSOFT FSE
|
| 1998 | — | conf |
PASTE
|
| 1997 | — | conf |
ESEC / SIGSOFT FSE
|
| 1997 | A* | conf |
ICSE
|
| 1996 | — | conf |
SIGSOFT FSE
|