default search action
Jeffrey S. Foster
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j20]Sai S. Yerramreddy, Austin Mordahl, Ugur Koc, Shiyi Wei, Jeffrey S. Foster, Marine Carpuat, Adam A. Porter:
An empirical assessment of machine learning approaches for triaging reports of static analysis tools. Empir. Softw. Eng. 28(2): 28 (2023) - [j19]Sankha Narayan Guria, Jeffrey S. Foster, David Van Horn:
Absynthe: Abstract Interpretation-Guided Synthesis. Proc. ACM Program. Lang. 7(PLDI): 1584-1607 (2023) - [c73]Aleksandr Fedchin, Tyler Dean, Jeffrey S. Foster, Eric Mercer, Zvonimir Rakamaric, Giles Reger, Neha Rungta, Robin Salkeld, Lucas Wagner, Cassidy Waldrip:
A Toolkit for Automated Testing of Dafny. NFM 2023: 397-413 - [c72]Michael Coblenz, Wentao Guo, Kamatchi Voozhian, Jeffrey S. Foster:
A Qualitative Study of REST API Design and Specification Practices. VL/HCC 2023: 148-156 - [i13]Sankha Narayan Guria, Jeffrey S. Foster, David Van Horn:
Absynthe: Abstract Interpretation-Guided Synthesis. CoRR abs/2302.13145 (2023) - 2021
- [j18]Milod Kazerounian, Jeffrey S. Foster, Bonan Min:
SimTyper: sound type inference for Ruby using type equality prediction. Proc. ACM Program. Lang. 5(OOPSLA): 1-27 (2021) - [c71]Nate F. F. Bragg, Jeffrey S. Foster, Cody Roux, Armando Solar-Lezama:
Program Sketching by Automatically Generating Mocks from Tests. CAV (1) 2021: 808-831 - [c70]Ugur Koc, Austin Mordahl, Shiyi Wei, Jeffrey S. Foster, Adam A. Porter:
SATune: A Study-Driven Auto-Tuning Approach for Configurable Software Verification Tools. ASE 2021: 330-342 - [c69]Sankha Narayan Guria, Jeffrey S. Foster, David Van Horn:
RbSyn: type- and effect-guided program synthesis. PLDI 2021: 344-358 - [i12]Sankha Narayan Guria, Jeffrey S. Foster, David Van Horn:
RbSyn: Type- and Effect-Guided Program Synthesis. CoRR abs/2102.13183 (2021) - 2020
- [c68]Candice Schumann, Jeffrey S. Foster, Nicholas Mattei, John P. Dickerson:
We Need Fairness and Explainability in Algorithmic Hiring. AAMAS 2020: 1716-1720 - [c67]Milod Kazerounian, Brianna M. Ren, Jeffrey S. Foster:
Sound, heuristic type annotation inference for Ruby. DLS 2020: 112-125 - [c66]Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Jeffrey S. Foster, Michelle L. Mazurek:
An Observational Investigation of Reverse Engineers' Processes. USENIX Security Symposium 2020: 1875-1892
2010 – 2019
- 2019
- [j17]Benjamin Mariano, Josh Reese, Siyuan Xu, ThanhVu Nguyen, Xiaokang Qiu, Jeffrey S. Foster, Armando Solar-Lezama:
Program synthesis with algebraic library specifications. Proc. ACM Program. Lang. 3(OOPSLA): 132:1-132:25 (2019) - [c65]Candice Schumann, Samsara N. Counts, Jeffrey S. Foster, John P. Dickerson:
The Diverse Cohort Selection Problem. AAMAS 2019: 601-609 - [c64]Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Jeffrey S. Foster, Michelle L. Mazurek:
An Observational Investigation of Reverse Engineers' Process and Mental Models. CHI Extended Abstracts 2019 - [c63]Ugur Koc, Shiyi Wei, Jeffrey S. Foster, Marine Carpuat, Adam A. Porter:
An Empirical Assessment of Machine Learning Approaches for Triaging Reports of a Java Static Analysis Tool. ICST 2019: 288-299 - [c62]Candice Schumann, Zhi Lang, Jeffrey S. Foster, John P. Dickerson:
Making the Cut: A Bandit-based Approach to Tiered Interviewing. NeurIPS 2019: 4641-4651 - [c61]Milod Kazerounian, Sankha Narayan Guria, Niki Vazou, Jeffrey S. Foster, David Van Horn:
Type-level computations for Ruby libraries. PLDI 2019: 966-979 - [i11]ThanhVu Nguyen, Ugur Koc, Javran Cheng, Jeffrey S. Foster, Adam A. Porter:
iGen: Dynamic Interaction Inference for Configurable Software. CoRR abs/1903.12247 (2019) - [i10]Milod Kazerounian, Sankha Narayan Guria, Niki Vazou, Jeffrey S. Foster, David Van Horn:
Type-Level Computations for Ruby Libraries. CoRR abs/1904.03521 (2019) - [i9]Candice Schumann, Zhi Lang, Jeffrey S. Foster, John P. Dickerson:
Making the Cut: A Bandit-based Approach to Tiered Interviewing. CoRR abs/1906.09621 (2019) - [i8]Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Jeffrey S. Foster, Michelle L. Mazurek:
An Observational Investigation of Reverse Engineers' Processes. CoRR abs/1912.00317 (2019) - 2018
- [c60]Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, Michael Hicks:
Evaluating Design Tradeoffs in Numeric Static Analysis for Java. ESOP 2018: 653-682 - [c59]Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Thomas Gilray, Michelle L. Mazurek, Jeffrey S. Foster:
User Comfort with Android Background Resource Accesses in Different Contexts. SOUPS @ USENIX Security Symposium 2018: 235-250 - [c58]Milod Kazerounian, Niki Vazou, Austin Bourgerie, Jeffrey S. Foster, Emina Torlak:
Refinement Types for Ruby. VMCAI 2018: 269-290 - [e1]Jeffrey S. Foster, Dan Grossman:
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2018, Philadelphia, PA, USA, June 18-22, 2018. ACM 2018, ISBN 978-1-4503-5698-5 [contents] - [i7]Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, Michael Hicks:
Evaluating Design Tradeoffs in Numeric Static Analysis for Java. CoRR abs/1802.08927 (2018) - 2017
- [j16]Jeffrey S. Foster:
Technical Perspective: Shedding new light on an old language debate. Commun. ACM 60(10): 90 (2017) - [j15]Jinseong Jeon, Xiaokang Qiu, Armando Solar-Lezama, Jeffrey S. Foster:
An empirical study of adaptive concretization for parallel program synthesis. Formal Methods Syst. Des. 50(1): 75-95 (2017) - [c57]Kristopher K. Micinski, Daniel Votipka, Rock Stevens, Nikolaos Kofinas, Michelle L. Mazurek, Jeffrey S. Foster:
User Interactions and Permission Use on Android. CHI 2017: 362-373 - [c56]Ugur Koc, Parsa Saadatpanah, Jeffrey S. Foster, Adam A. Porter:
Learning a classifier for false positive error reports emitted by static code analysis tools. MAPL@PLDI 2017: 35-42 - [i6]Candice Schumann, Samsara N. Counts, Jeffrey S. Foster, John P. Dickerson:
The Diverse Cohort Selection Problem: Multi-Armed Bandits with Varied Pulls. CoRR abs/1709.03441 (2017) - [i5]Milod Kazerounian, Niki Vazou, Austin Bourgerie, Jeffrey S. Foster, Emina Torlak:
Refinement Types for Ruby. CoRR abs/1711.09281 (2017) - 2016
- [j14]Karla Saur, Michael W. Hicks, Jeffrey S. Foster:
C-strider: type-aware heap traversal for C. Softw. Pract. Exp. 46(6): 767-788 (2016) - [c55]Jinseong Jeon, Xiaokang Qiu, Jonathan Fetter-Degges, Jeffrey S. Foster, Armando Solar-Lezama:
Synthesizing framework models for symbolic execution. ICSE 2016: 156-167 - [c54]Brianna M. Ren, Jeffrey S. Foster:
Just-in-time static type checking for dynamic languages. PLDI 2016: 462-476 - [c53]ThanhVu Nguyen, Ugur Koc, Javran Cheng, Jeffrey S. Foster, Adam A. Porter:
iGen: dynamic interaction inference for configurable software. SIGSOFT FSE 2016: 655-665 - [i4]Brianna M. Ren, Jeffrey S. Foster:
Just-in-Time Static Type Checking for Dynamic Languages. CoRR abs/1604.03641 (2016) - 2015
- [c52]Jinseong Jeon, Xiaokang Qiu, Armando Solar-Lezama, Jeffrey S. Foster:
Adaptive Concretization for Parallel Program Synthesis. CAV (2) 2015: 377-394 - [c51]Kristopher K. Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, Michael R. Clarkson:
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. ESORICS (2) 2015: 520-538 - [c50]Matthew A. Hammer, Jana Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael W. Hicks, David Van Horn:
Incremental computation with names. OOPSLA 2015: 748-766 - [c49]Jinseong Jeon, Xiaokang Qiu, Jeffrey S. Foster, Armando Solar-Lezama:
JSketch: sketching for Java. ESEC/SIGSOFT FSE 2015: 934-937 - [i3]Matthew A. Hammer, Jana Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael Hicks, David Van Horn:
Incremental Computation with Names. CoRR abs/1503.07792 (2015) - [i2]Kristopher K. Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, Michael R. Clarkson:
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. CoRR abs/1504.03711 (2015) - [i1]Jinseong Jeon, Xiaokang Qiu, Jeffrey S. Foster, Armando Solar-Lezama:
JSKETCH: Sketching for Java. CoRR abs/1507.03577 (2015) - 2014
- [j13]Christopher M. Hayden, Karla Saur, Edward K. Smith, Michael W. Hicks, Jeffrey S. Foster:
Kitsune: Efficient, General-Purpose Dynamic Software Updating for C. ACM Trans. Program. Lang. Syst. 36(4): 13:1-13:38 (2014) - [j12]Charles Song, Adam A. Porter, Jeffrey S. Foster:
iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees. IEEE Trans. Software Eng. 40(3): 251-265 (2014) - [c48]T. Stephen Strickland, Brianna M. Ren, Jeffrey S. Foster:
Contracts for domain-specific languages in Ruby. DLS 2014: 23-34 - [c47]Matthew A. Hammer, Yit Phang Khoo, Michael Hicks, Jeffrey S. Foster:
Adapton: composable, demand-driven incremental computation. PLDI 2014: 156-166 - 2013
- [j11]Saurabh Srivastava, Sumit Gulwani, Jeffrey S. Foster:
Template-based program verification and program synthesis. Int. J. Softw. Tools Technol. Transf. 15(5-6): 497-518 (2013) - [c46]Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks:
Expositor: scriptable time-travel debugging with first-class traces. ICSE 2013: 352-361 - [c45]Brianna M. Ren, John Toman, T. Stephen Strickland, Jeffrey S. Foster:
The ruby type checker. SAC 2013: 1565-1572 - 2012
- [j10]Christopher M. Hayden, Edward K. Smith, Eric A. Hardisty, Michael Hicks, Jeffrey S. Foster:
Evaluating Dynamic Software Update Safety Using Systematic Testing. IEEE Trans. Software Eng. 38(6): 1340-1354 (2012) - [c44]Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Ari Fogel, Nikhilesh Reddy, Jeffrey S. Foster, Todd D. Millstein:
Dr. Android and Mr. Hide: fine-grained permissions in android applications. SPSM@CCS 2012: 3-14 - [c43]Christopher M. Hayden, Karla Saur, Michael Hicks, Jeffrey S. Foster:
A study of dynamic software update quiescence for multithreaded programs. HotSWUp 2012: 6-10 - [c42]Edward K. Smith, Michael Hicks, Jeffrey S. Foster:
Towards standardized benchmarks for Dynamic Software Updating systems. HotSWUp 2012: 11-15 - [c41]Charles Song, Adam A. Porter, Jeffrey S. Foster:
iTree: Efficiently discovering high-coverage configurations using interaction trees. ICSE 2012: 903-913 - [c40]Christopher M. Hayden, Edward K. Smith, Michail Denchev, Michael Hicks, Jeffrey S. Foster:
Kitsune: efficient, general-purpose dynamic software updating for C. OOPSLA 2012: 249-264 - [c39]Christopher M. Hayden, Stephen Magill, Michael Hicks, Nate Foster, Jeffrey S. Foster:
Specifying and Verifying the Correctness of Dynamic Software Updates. VSTTE 2012: 278-293 - 2011
- [j9]Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks:
LOCKSMITH: Practical static race detection for C. ACM Trans. Program. Lang. Syst. 33(1): 3:1-3:55 (2011) - [c38]Christopher M. Hayden, Edward K. Smith, Michael Hicks, Jeffrey S. Foster:
State transfer for clear and efficient runtime updates. ICDE Workshops 2011: 179-184 - [c37]Saurabh Srivastava, Sumit Gulwani, Swarat Chaudhuri, Jeffrey S. Foster:
Path-based inductive synthesis for program inversion. PLDI 2011: 492-503 - [c36]Jong-hoon (David) An, Avik Chaudhuri, Jeffrey S. Foster, Michael Hicks:
Dynamic inference of static types for ruby. POPL 2011: 459-472 - [c35]Kin-Keung Ma, Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks:
Directed Symbolic Execution. SAS 2011: 95-111 - 2010
- [j8]Michael W. Hicks, Jeffrey S. Foster:
SCORE: agile research group management. Commun. ACM 53(10): 30-31 (2010) - [j7]Jeffrey A. Meister, Jeffrey S. Foster, Michael Hicks:
Serializing C intermediate representations for efficient and portable parsing. Softw. Pract. Exp. 40(3): 225-238 (2010) - [c34]Avik Chaudhuri, Jeffrey S. Foster:
Symbolic security analysis of ruby-on-rails web applications. CCS 2010: 585-594 - [c33]Elnatan Reisner, Charles Song, Kin-Keung Ma, Jeffrey S. Foster, Adam A. Porter:
Using symbolic evaluation to understand behavior in configurable software systems. ICSE (1) 2010: 445-454 - [c32]Yit Phang Khoo, Bor-Yuh Evan Chang, Jeffrey S. Foster:
Mixing type checking and symbolic execution. PLDI 2010: 436-447 - [c31]Saurabh Srivastava, Sumit Gulwani, Jeffrey S. Foster:
From program verification to program synthesis. POPL 2010: 313-326
2000 – 2009
- 2009
- [j6]Jim Allen, Zena M. Ariola, Pierre-Louis Curien, Matthew Fluet, Jeffrey S. Foster, Dan Grossman, Robert Harper, Hugo Herbelin, Yannis Smaragdakis, David Walker, Steve Zdancewic:
An overview of the Oregon programming languages summer school. ACM SIGPLAN Notices 44(11): 1-3 (2009) - [c30]Saurabh Srivastava, Sumit Gulwani, Jeffrey S. Foster:
VS3: SMT Solvers for Program Verification. CAV 2009: 702-708 - [c29]Yit Phang Khoo, Michael Hicks, Jeffrey S. Foster, Vibha Sazawal:
Directing JavaScript with arrows. DLS 2009: 49-58 - [c28]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael Hicks:
The ruby intermediate language. DLS 2009: 89-98 - [c27]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael Hicks:
Tests to the left of me, types to the right: how not to get stuck in the middle of a ruby execution. STOP@ECOOP 2009: 14-16 - [c26]Christopher M. Hayden, Eric A. Hardisty, Michael W. Hicks, Jeffrey S. Foster:
Efficient Systematic Testing for Dynamically Updatable Software. HotSWUp 2009 - [c25]Jong-hoon (David) An, Avik Chaudhuri, Jeffrey S. Foster:
Static Typing for Ruby on Rails. ASE 2009: 590-594 - [c24]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster:
Profile-guided static typing for dynamic scripting languages. OOPSLA 2009: 283-300 - [c23]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael W. Hicks:
Static type inference for Ruby. SAC 2009: 1859-1866 - 2008
- [j5]Octavian Udrea, Cristian Lumezanu, Jeffrey S. Foster:
Rule-based static analysis of network protocol implementations. Inf. Comput. 206(2-4): 130-157 (2008) - [j4]Michael Furr, Jeffrey S. Foster:
Checking type safety of foreign function calls. ACM Trans. Program. Lang. Syst. 30(4): 18:1-18:63 (2008) - [j3]Saurabh Srivastava, Michael Hicks, Jeffrey S. Foster, Patrick Jenkins:
Modular Information Hiding and Type-Safe Linking for C. IEEE Trans. Software Eng. 34(3): 357-376 (2008) - [c22]Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks, Vibha Sazawal:
Path projection for user-centered static analysis tools. PASTE 2008: 57-63 - [c21]Iulian Neamtiu, Michael Hicks, Jeffrey S. Foster, Polyvios Pratikakis:
Contextual effects for version-consistent dynamic software updatingalland safe concurrent programming. POPL 2008: 37-49 - [c20]Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks, Iulian Neamtiu:
Formalizing Soundness of Contextual Effects. TPHOLs 2008: 262-277 - 2007
- [c19]David Greenfieldboyce, Jeffrey S. Foster:
Type qualifier inference for java. OOPSLA 2007: 321-336 - [c18]Kin-Keung Ma, Jeffrey S. Foster:
Inferring aliasing and encapsulation properties for java. OOPSLA 2007: 423-440 - [c17]Jeffrey S. Foster, Michael W. Hicks, William W. Pugh:
Improving software quality with static analysis. PASTE 2007: 83-84 - [c16]Saurabh Srivastava, Michael Hicks, Jeffrey S. Foster:
Modular information hiding and type-safe linking for C. TLDI 2007: 3-14 - 2006
- [j2]Jeffrey S. Foster, Robert Johnson, John Kodumal, Alex Aiken:
Flow-insensitive type qualifiers. ACM Trans. Program. Lang. Syst. 28(6): 1035-1087 (2006) - [c15]Michael Furr, Jeffrey S. Foster:
Polymorphic Type Inference for the JNI. ESOP 2006: 309-324 - [c14]Polyvios Pratikakis, Jeffrey S. Foster, Michael W. Hicks:
LOCKSMITH: context-sensitive correlation analysis for race detection. PLDI 2006: 320-331 - [c13]Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks:
Existential Label Flow Inference Via CFL Reachability. SAS 2006: 88-106 - 2005
- [j1]Iulian Neamtiu, Jeffrey S. Foster, Michael Hicks:
Understanding source code evolution using abstract syntax tree matching. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-5 (2005) - [c12]Iulian Neamtiu, Jeffrey S. Foster, Michael W. Hicks:
Understanding source code evolution using abstract syntax tree matching. MSR 2005 - [c11]Michael Furr, Jeffrey S. Foster:
Checking type safety of foreign function calls. PLDI 2005: 62-72 - 2004
- [c10]David Greenfieldboyce, Jeffrey S. Foster:
Visualizing type qualifier inference with Eclipse. eTX 2004: 57-61 - [c9]Nick Rutar, Christian B. Almazan, Jeffrey S. Foster:
A Comparison of Bug Finding Tools for Java. ISSRE 2004: 245-256 - 2003
- [c8]Alex Aiken, Jeffrey S. Foster, John Kodumal, Tachio Terauchi:
Checking and inferring local non-aliasing. PLDI 2003: 129-140 - 2002
- [c7]Jeffrey S. Foster, Tachio Terauchi, Alex Aiken:
Flow-Sensitive Type Qualifiers. PLDI 2002: 1-12 - 2001
- [c6]Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, David A. Wagner:
Detecting Format String Vulnerabilities with Type Qualifiers. USENIX Security Symposium 2001 - 2000
- [c5]David A. Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. NDSS 2000 - [c4]Jeffrey S. Foster, Manuel Fähndrich, Alexander Aiken:
Polymorphic versus Monomorphic Flow-Insensitive Points-to Analysis for C. SAS 2000: 175-198
1990 – 1999
- 1999
- [c3]Jeffrey S. Foster, Manuel Fähndrich, Alexander Aiken:
A Theory of Type Qualifiers. PLDI 1999: 192-203 - 1998
- [c2]Manuel Fähndrich, Jeffrey S. Foster, Zhendong Su, Alexander Aiken:
Partial Online Cycle Elimination in Inclusion Constraint Graphs. PLDI 1998: 85-96 - [c1]Alexander Aiken, Manuel Fähndrich, Jeffrey S. Foster, Zhendong Su:
A Toolkit for Constructing Type- and Constraint-Based Program Analyses. Types in Compilation 1998: 78-96
Coauthor Index
aka: Michael W. Hicks
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint