Thomas S. Heinze

Orcid: 0000-0001-8816-7013

Affiliations:
  • Friedrich Schiller University Jena, Institute of Computer Science, Germany


According to our database1, Thomas S. Heinze authored at least 40 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cross-Domain Evaluation of a Deep Learning-Based Type Inference System.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

Finding Source Code Clones in Intermediate Representations of Java Bytecode.
Proceedings of the 17th IEEE International Workshop on Software Clones, 2023

StoneDetector: Structural and Sub-Clone Detection.
Proceedings of the 17th IEEE International Workshop on Software Clones, 2023

A Static Analysis Platform for Investigating Security Trends in Repositories.
Proceedings of the 1st IEEE/ACM International Workshop on Software Vulnerability, 2023

2022
Deep security analysis of program code.
Empir. Softw. Eng., 2022

BPMN in the Wild: A Reprise.
Proceedings of the 14th Central European Workshop on Services and their Composition (ZEUS 2022), 2022

Experiments on Code Clone Detection and Machine Learning.
Proceedings of the 16th IEEE International Workshop on Software Clones, 2022

2021
Detecting Semantic Business Process Model Clones.
Proceedings of the 13th European Workshop on Services and their Composition (ZEUS 2021), 2021

>Stubber: Compiling Source Code into Bytecode without Dependencies for Java Code Clone Detection.
Proceedings of the 15th IEEE International Workshop on Software Clones, 2021

Provenance-Based Security Audits and Its Application to COVID-19 Contact Tracing Apps.
Proceedings of the Provenance and Annotation of Data and Processes, 2021

You Look so Different: Finding Structural Clones and Subclones in Java Source Code.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

U sing Clone Detection for Finding Signatures of Malware Families: A Case Study on FinSpy.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2021

2020
Erste Überlegungen zur Erklärbarkeit von Deep-Learning-Modellen für die Analyse von Quellcode.
Softwaretechnik-Trends, 2020

BPMN in the Wild: BPMN on GitHub.com.
Proceedings of the 12th ZEUS Workshop on Services and their Composition, 2020

Benchmarking Open-Source Static Analyzers for Security Testing for C.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Tools and Trends, 2020

Mining BPMN Processes on GitHub for Tool Validation and Development.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2020

Detection of Similar Functions Through the Use of Dominator Information.
Proceedings of the 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2020

2019
PANIC - Plugging Data Leak Detection into the Camunda Modeler (short paper).
Proceedings of the 11th Central European Workshop on Services and their Composition, 2019

Security Challenges of Cloud Manufacturing: A Case Study in the Aerospace Domain (short paper).
Proceedings of the 11th Central European Workshop on Services and their Composition, 2019

Scientific developers v/s static analysis tools: vision and position paper.
Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering, 2019

2018
Static analysis and process model transformation for an advanced business process to Petri net mapping.
Softw. Pract. Exp., 2018

Schritte zu einer zertifizierten Informationsflussanalyse von Geschäftsprozessen (Towards a Certified Information Flow Analysis for Business Processes).
Proceedings of the 10th Central European Workshop on Services and their Composition, 2018

Certified Information Flow Analysis of Service Implementations.
Proceedings of the 11th IEEE Conference on Service-Oriented Computing and Applications, 2018

2017
Towards Certified Data Flow Analysis of Business Processes.
Proceedings of the 9th Central European Workshop on Services and their Composition (ZEUS 2017), 2017

2016
Sparse Analysis of Variable Path Predicates Based upon SSA-Form.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016

Type safety analysis for Dart.
Proceedings of the 12th Symposium on Dynamic Languages, 2016

2014
Message Assertions and Predicate-Based Control-Flow Unfolding Revisited.
Proceedings of the 6th Central-European Workshop on Services and their Composition, 2014

Compiling More Precise Petri Net Models for an Improved Verification of Service Implementations.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

Portable Green Cloud Services.
Proceedings of the CLOSER 2014, 2014

2013
Eine Methode zur kontrollierten Kontrollflussentfaltung und ihre Anwendung zur Präzisierung petrinetzbasierter Verifikationsmodelle.
PhD thesis, 2013

Control Flow Unfolding of Workflow Graphs Using Predicate Analysis and SMT Solving.
Proceedings of the 5<sup>th</sup> Central-European Workshop on Services and their Composition, 2013

2012
Guided Control Flow Unfolding for Workflow Graphs Using Value Range Information.
Proceedings of the 4<sup>th</sup> Central-European Workshop on Services and their Composition, 2012

2011
Effiziente Abschätzung von Datenflussfehlern in strukturierten Geschäftsprozessen.
Proceedings of the 3rd Central-European Workshop on Services and their Composition, 2011

2010
Prozessumstrukturierung unter Berücksichtigung von Nachrichteninhalten.
Proceedings of the 2nd Central-European Workshop on Services and their Composition, 2010

Efficient Test Suite Reduction by Merging Pairs of Suitable Test Cases.
Proceedings of the Models in Software Engineering, 2010

Process Restructuring in the Presence of Message-Dependent Variables.
Proceedings of the Service-Oriented Computing, 2010

2009
Umstrukturierung von WS-BPEL-Prozessen zur Verbesserung des Validierungsverhaltens.
Proceedings of the 1st Central-European Workshop on Services and their Composition, 2009

A Restructuring Method for WS-BPEL Business Processes Based on Extended Workflow Graphs.
Proceedings of the Business Process Management, 7th International Conference, 2009

2008
Intermediate Representations of Mobile Code.
Informatica (Slovenia), 2008

Generic CSSA-Based Pattern over Boolean Data for an Improved WS-BPEL to Petri Net Mappping.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008


  Loading...