default search action
Thomas S. Heinze
Person information
- affiliation: Friedrich Schiller University Jena, Institute of Computer Science, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c35]Tim Sonnekalb, Christopher-Tobias Knaust, Bernd Gruner, Clemens-Alexander Brust, Thomas S. Heinze, Lynn von Kurnatowski, Andreas Schreiber, Patrick Mäder:
A Static Analysis Platform for Investigating Security Trends in Repositories. SVM 2023: 1-5 - [c34]André Schäfer, Wolfram Amme, Thomas S. Heinze:
StoneDetector: Structural and Sub-Clone Detection. IWSC 2023: 33-36 - [c33]André Schäfer, Thomas S. Heinze, Wolfram Amme:
Finding Source Code Clones in Intermediate Representations of Java Bytecode. IWSC 2023: 37-43 - [c32]Bernd Gruner, Tim Sonnekalb, Thomas S. Heinze, Clemens-Alexander Brust:
Cross-Domain Evaluation of a Deep Learning-Based Type Inference System. MSR 2023: 158-169 - [i2]Tim Sonnekalb, Christopher-Tobias Knaust, Bernd Gruner, Clemens-Alexander Brust, Lynn von Kurnatowski, Andreas Schreiber, Thomas S. Heinze, Patrick Mäder:
A Static Analysis Platform for Investigating Security Trends in Repositories. CoRR abs/2304.01725 (2023) - 2022
- [j4]Tim Sonnekalb, Thomas S. Heinze, Patrick Mäder:
Deep security analysis of program code. Empir. Softw. Eng. 27(1): 2 (2022) - [c31]André Schäfer, Wolfram Amme, Thomas S. Heinze:
Experiments on Code Clone Detection and Machine Learning. IWSC 2022: 46-52 - [c30]Jasmin Türker, Michael Völske, Thomas S. Heinze:
BPMN in the Wild: A Reprise. ZEUS 2022: 68-75 - [i1]Bernd Gruner, Tim Sonnekalb, Thomas S. Heinze, Clemens-Alexander Brust:
Cross-Domain Evaluation of a Deep Learning-Based Type Inference System. CoRR abs/2208.09189 (2022) - 2021
- [c29]Nils Scheidweiler, André Schäfer, Wolfram Amme, Thomas S. Heinze:
U sing Clone Detection for Finding Signatures of Malware Families: A Case Study on FinSpy. ACSOS-C 2021: 269-274 - [c28]Wolfram Amme, Thomas S. Heinze, André Schäfer:
You Look so Different: Finding Structural Clones and Subclones in Java Source Code. ICSME 2021: 70-80 - [c27]Andreas Schreiber, Tim Sonnekalb, Thomas S. Heinze, Lynn von Kurnatowski, Jesús M. González-Barahona, Heather S. Packer:
Provenance-Based Security Audits and Its Application to COVID-19 Contact Tracing Apps. IPAW 2021: 88-105 - [c26]André Schäfer, Wolfram Amme, Thomas S. Heinze:
>Stubber: Compiling Source Code into Bytecode without Dependencies for Java Code Clone Detection. IWSC 2021: 29-35 - [c25]Thomas S. Heinze, Wolfram Amme, André Schäfer:
Detecting Semantic Business Process Model Clones. ZEUS 2021: 25-28 - 2020
- [j3]Tim Sonnekalb, Thomas S. Heinze, Patrick Mäder:
Erste Überlegungen zur Erklärbarkeit von Deep-Learning-Modellen für die Analyse von Quellcode. Softwaretechnik-Trends 40(2): 39-40 (2020) - [c24]André Schäfer, Wolfram Amme, Thomas S. Heinze:
Detection of Similar Functions Through the Use of Dominator Information. ACSOS Companion 2020: 206-211 - [c23]Thomas S. Heinze, Viktor Stefanko, Wolfram Amme:
Mining BPMN Processes on GitHub for Tool Validation and Development. BPMDS/EMMSAD@CAiSE 2020: 193-208 - [c22]Christoph Gentsch, Rohan Krishnamurthy, Thomas S. Heinze:
Benchmarking Open-Source Static Analyzers for Security Testing for C. ISoLA (4) 2020: 182-198 - [c21]Thomas S. Heinze, Viktor Stefanko, Wolfram Amme:
BPMN in the Wild: BPMN on GitHub.com. ZEUS 2020: 26-29
2010 – 2019
- 2019
- [c20]Rohan Krishnamurthy, Thomas S. Heinze, Carina Haupt, Andreas Schreiber, Michael Meinel:
Scientific developers v/s static analysis tools: vision and position paper. CHASE@ICSE 2019: 89-90 - [c19]Jasmin Türker, Thomas S. Heinze:
PANIC - Plugging Data Leak Detection into the Camunda Modeler (short paper). ZEUS 2019: 32-34 - [c18]Diana Peters, Thomas S. Heinze:
Security Challenges of Cloud Manufacturing: A Case Study in the Aerospace Domain (short paper). ZEUS 2019: 58-61 - 2018
- [j2]Thomas S. Heinze, Wolfram Amme, Simon Moser:
Static analysis and process model transformation for an advanced business process to Petri net mapping. Softw. Pract. Exp. 48(1): 161-195 (2018) - [c17]Thomas S. Heinze, Jasmin Türker:
Certified Information Flow Analysis of Service Implementations. SOCA 2018: 177-184 - [c16]Thomas S. Heinze:
Schritte zu einer zertifizierten Informationsflussanalyse von Geschäftsprozessen (Towards a Certified Information Flow Analysis for Business Processes). ZEUS 2018: 24-31 - 2017
- [c15]Thomas S. Heinze:
Towards Certified Data Flow Analysis of Business Processes. ZEUS 2017: 1-3 - 2016
- [c14]Thomas S. Heinze, Anders Møller, Fabio Strocco:
Type safety analysis for Dart. DLS 2016: 1-12 - [c13]Thomas S. Heinze, Wolfram Amme:
Sparse Analysis of Variable Path Predicates Based upon SSA-Form. ISoLA (1) 2016: 227-242 - 2015
- [e1]Thomas S. Heinze, Thomas M. Prinz:
Proceedings of the 7th Central European Workshop on Services and their Composition, ZEUS 2015, Jena, Germany, February 19-20, 2015. CEUR Workshop Proceedings 1360, CEUR-WS.org 2015 [contents] - 2014
- [c12]Stephan Ulbricht, Wolfram Amme, Thomas S. Heinze, Simon Moser, Hans-Dieter Wehle:
Portable Green Cloud Services. CLOSER 2014: 53-59 - [c11]Thomas S. Heinze, Wolfram Amme, Simon Moser:
Compiling More Precise Petri Net Models for an Improved Verification of Service Implementations. SOCA 2014: 25-32 - [c10]Thomas S. Heinze, Wolfram Amme, Simon Moser:
Message Assertions and Predicate-Based Control-Flow Unfolding Revisited. ZEUS 2014: 17-20 - 2013
- [b1]Thomas S. Heinze:
Eine Methode zur kontrollierten Kontrollflussentfaltung und ihre Anwendung zur Präzisierung petrinetzbasierter Verifikationsmodelle. Friedrich Schiller University of Jena, 2013, pp. 1-141 - [c9]Thomas S. Heinze, Wolfram Amme, Simon Moser:
Control Flow Unfolding of Workflow Graphs Using Predicate Analysis and SMT Solving. ZEUS 2013: 1-8 - 2012
- [c8]Thomas S. Heinze, Wolfram Amme, Simon Moser, Kai Gebhardt:
Guided Control Flow Unfolding for Workflow Graphs Using Value Range Information. ZEUS 2012: 128-135 - 2011
- [c7]Thomas S. Heinze, Wolfram Amme, Simon Moser:
Effiziente Abschätzung von Datenflussfehlern in strukturierten Geschäftsprozessen. ZEUS 2011: 73-80 - 2010
- [c6]Thomas S. Heinze, Wolfram Amme, Simon Moser:
Process Restructuring in the Presence of Message-Dependent Variables. ICSOC Workshops 2010: 121-132 - [c5]Harald Cichos, Thomas S. Heinze:
Efficient Test Suite Reduction by Merging Pairs of Suitable Test Cases. MoDELS (Workshops) 2010: 244-258 - [c4]Thomas S. Heinze, Wolfram Amme, Simon Moser:
Prozessumstrukturierung unter Berücksichtigung von Nachrichteninhalten. ZEUS 2010: 89-96
2000 – 2009
- 2009
- [c3]Thomas S. Heinze, Wolfram Amme, Simon Moser:
A Restructuring Method for WS-BPEL Business Processes Based on Extended Workflow Graphs. BPM 2009: 211-228 - [c2]Thomas S. Heinze, Wolfram Amme, Simon Moser:
Umstrukturierung von WS-BPEL-Prozessen zur Verbesserung des Validierungsverhaltens. ZEUS 2009: 88-94 - 2008
- [j1]Wolfram Amme, Thomas S. Heinze, Jeffery von Ronne:
Intermediate Representations of Mobile Code. Informatica (Slovenia) 32(1): 1-25 (2008) - [c1]Thomas S. Heinze, Wolfram Amme, Simon Moser:
Generic CSSA-Based Pattern over Boolean Data for an Improved WS-BPEL to Petri Net Mappping. ICIW 2008: 590-595
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint