default search action
Huascar Sanchez
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c16]Huascar Sanchez, Briland Hitaj:
Software Introspection for Signaling Social-Cyber Operations. CPS-IoT Week Workshops 2023: 84-85 - 2022
- [i3]Natarajan Shankar, Devesh Bhatt, Michael D. Ernst, Minyoung Kim, Srivatsan Varadarajan, Suzanne Millstein, Jorge Navas, Jason Biatek, Huascar Sanchez, Anitha Murugesan, Hao Ren:
DesCert: Design for Certification. CoRR abs/2203.15178 (2022) - [i2]Huascar Sanchez, Briland Hitaj:
Trust in Motion: Capturing Trust Ascendancy in Open-Source Projects using Hybrid AI. CoRR abs/2210.02656 (2022) - 2021
- [i1]Luiz Giovanini, Daniela Oliveira, Huascar Sanchez, Deborah Shands:
Leveraging Team Dynamics to Predict Open-source Software Projects' Susceptibility to Social Engineering Attacks. CoRR abs/2106.16067 (2021)
2010 – 2019
- 2016
- [c15]Temesghen Kahsai, Philipp Rümmer, Huascar Sanchez, Martin Schäf:
JayHorn: A Framework for Verifying Java programs. CAV (1) 2016: 352-358 - [c14]Kate Compton, Heather Logas, Joseph C. Osborn, Chandranil Chakraborttii, Kelsey Coffman, Daniel Fava, Dylan Lederle-Ensign, Zhongpeng Lin, Jo Mazeika, Afshin Mobramaein, Johnathan Pagnutti, Huascar Sanchez, Jim Whitehead, Brenda Laurel:
Design Lessons From Binary Fission: A Crowd Sourced Game for Precondition Discovery. DiGRA/FDG 2016 - [c13]Wenchao Li, Hossein Saidi, Huascar Sanchez, Martin Schäf, Pascal Schweitzer:
Detecting Similar Programs via The Weisfeiler-Leman Graph Kernel. ICSR 2016: 315-330 - [c12]Huascar Sanchez, Jim Whitehead, Martin Schäf:
Multistaging to understand: Distilling the essence of java code examples. ICPC 2016: 1-10 - [c11]Huascar Sanchez, John T. Murray:
Putting Your Passwords on Self-destruct Mode: Beating Password Fatigue. WSF@SOUPS 2016 - 2015
- [b1]Huáscar Antonio Sánchez:
Source Code Curation Tooling for the Code Forager. University of California, Santa Cruz, USA, 2015 - [c10]Huascar Sanchez, Jim Whitehead:
Source Code Curation on StackOverflow: The Vesperin System. ICSE (2) 2015: 661-664 - 2014
- [c9]Heather Logas, Jim Whitehead, Michael Mateas, Richard Vallejos, Lauren Scott, John T. Murray, Kate Compton, Joseph C. Osborn, Orlando Salvatore, Daniel G. Shapiro, Zhongpeng Lin, Huascar Sanchez, Michael Shavlovsky, Chris Lewis, Daniel Cetina, Shayne Clementi:
Xylem: The Code of Plants. FDG 2014 - [c8]Heather Logas, Jim Whitehead, Michael Mateas, Richard Vallejos, Lauren Scott, Daniel G. Shapiro, John T. Murray, Kate Compton, Joseph C. Osborn, Orlando Salvatore, Zhongpeng Lin, Huascar Sanchez, Michael Shavlovsky, Daniel Cetina, Shayne Clementi, Chris Lewis:
Software verification games: Designing Xylem, The Code of Plants. FDG 2014 - 2013
- [c7]Huascar Sanchez:
SNIPR: complementing code search with code retargeting capabilities. ICSE 2013: 1423-1426 - 2012
- [c6]Ivo Jimenez, Huascar Sanchez, Quoc Trung Tran, Neoklis Polyzotis:
Kaizen: a semi-automatic index advisor. SIGMOD Conference 2012: 685-688 - 2011
- [j1]Ivo Jimenez, Jeff LeFevre, Neoklis Polyzotis, Huascar Sanchez, Karl Schnaitter:
Benchmarking Online Index-Tuning Algorithms. IEEE Data Eng. Bull. 34(4): 28-35 (2011) - 2010
- [c5]Mohamed E. Fayad, Huáscar A. Sánchez, Shivanshu K. Singh:
Knowledge Maps - Fundamentally Modular Approach to Software Architecture, Design, Development and Deployment. SEDE 2010: 127-133
2000 – 2009
- 2006
- [c4]Huáscar A. Sánchez, Mohamed E. Fayad:
The Branding Analysis Pattern. AICCSA 2006: 361-364 - 2005
- [c3]Mohamed Fayad, Haitham S. Hamza, Huáscar A. Sánchez:
Towards scalable and adaptable software architectures. IRI 2005: 102-107 - 2003
- [c2]Mohamed E. Fayad, Haitham S. Hamza, Huáscar A. Sánchez:
A Pattern for an Effective Class Responsibility Collaborator (CRC) Cards. IRI 2003: 584-587 - [c1]Huáscar A. Sánchez, Mohamed E. Fayad, Binbin Lai:
The Sampling Analysis Pattern. IRI 2003: 601-608
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint