Name
Affiliation
Papers
MIRA MEZINI
TUD, Darmstadt, Germany
223
Collaborators
Citations 
PageRank 
268
3171
211.04
Referers 
Referees 
References 
4539
3686
2805
Search Limit
1001000
Title
Citations
PageRank
Year
Dependently-Typed Data Plane Programming00.342022
CiFi: Versatile Analysis of Class and Field Immutability00.342021
NerdBug: automated bug detection in neural networks00.342021
Python Crypto Misuses in the Wild00.342021
Impact of programming languages on machine learning bugs00.342021
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild00.342020
A Programming Model for Semi-Implicit Parallelization of Static Analyses10.352020
Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy10.352020
Language-integrated privacy-aware distributed queries00.342019
Smart Street Lights and Mobile Citizen Apps for Resilient Communication in a Digital City00.342019
Online Reprogrammable Multi Tenant Switches.10.352019
Investigating next steps in static API-misuse detection10.362019
DTN7 - An Open-Source Disruption-Tolerant Networking Implementation of Bundle Protocol 7.30.422019
A Systematic Evaluation of Static API-Misuse Detectors220.702019
Judge: identifying, understanding, and evaluating sources of unsoundness in call graphs30.392019
A fault-tolerant programming model for distributed interactive applications00.342019
CodeMatch.00.342018
Fault-tolerant Distributed Reactive Programming.20.402018
Call graph construction for Java libraries.30.372018
Versatile event correlation with algebraic effects00.342018
Systematic evaluation of the unsoundness of call graph construction algorithms for Java.30.382018
CrySL : An Extensible Approach to Validating the Correct Usage of Cryptographic APIs70.442018
CogniCrypt: supporting developers in using cryptography.50.412017
A Co-contextual Type Checker for Featherweight Java .00.342017
On the Positive Effect of Reactive Programming on Software Comprehension: An Empirical Study.30.382017
Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation10.352017
A dataset of simplified syntax trees for C#.80.662016
CPL: A Core Language for Cloud Computing - Technical Report.00.342016
Debugging for reactive programming.70.472016
MUBench: a benchmark for API-misuse detectors.190.692016
Intelligent Code Completion with Bayesian Networks.170.832015
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T)50.432015
Towards standardized evaluation of developer-assistance tools90.642014
SPLLIFT: statically analyzing software product lines in minutes instead of years250.782014
Modular specification and dynamic enforcement of syntactic language constraints when generating code10.412014
Finding bugs in program generators by dynamic analysis of syntactic language constraints00.342014
i3QL: language-integrated live data views70.462014
Blending and reusing rules for architectural degradation prevention100.532014
REScala: bridging between object-oriented and functional style in reactive applications281.252014
JEScala: modular coordination with declarative events and joins50.432014
Programming with Implicit Flows.30.482014
Method-call recommendations from implicit developer feedback50.402014
Towards Reactive Programming for Object-Oriented Applications.30.412013
Automated API Property Inference Techniques802.042013
XPoints: Extension Interfaces for Multilayered Applications00.342013
Reactive behavior in object-oriented applications: an analysis and a research roadmap130.942013
Template constructors for reusable object initialization00.342013
Modular specification and checking of structural dependencies70.492013
Incremental concrete syntax for embedded languages with support for separate compilation60.432013
A recommendation system for exception handling code30.382012
  • 1
  • 2