default search action
Thomas Hirsch
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Thomas Hirsch, Birgit Hofer
:
Best practices for evaluating IRFL approaches. J. Syst. Softw. 222: 112342 (2025) - 2024
- [c19]Adil Mukhtar, Thomas Hirsch, Gerald Schweiger:
One-Class Classification and Cluster Ensembles for Anomaly Detection and Diagnosis in Multivariate Time Series Data. DX 2024: 14:1-14:19 - [c18]Gerda Langer, Thomas Hirsch, Roman Kern
, Theresa Kohl, Gerald Schweiger
:
Large Language Models for Fault Detection in Buildings' HVAC Systems. EI.A (2) 2024: 49-60 - [d2]Christoph Siegl, Thomas Hirsch, Theresa Kohl, Franz Wotawa
, Gerald Schweiger:
Data and Sourcecode from: Neural Network-based Occupancy Detection on the Edge. Zenodo, 2024 - [d1]Christoph Siegl, Thomas Hirsch, Theresa Kohl, Franz Wotawa
, Gerald Schweiger:
Data and Sourcecode from: Neural Network-based Occupancy Detection on the Edge. Zenodo, 2024 - [i6]Johannes Exenberger, Matteo Di Salvo, Thomas Hirsch, Franz Wotawa, Gerald Schweiger:
Generalizable Temperature Nowcasting with Physics-Constrained RNNs for Predictive Maintenance of Wind Turbine Components. CoRR abs/2404.04126 (2024) - 2023
- [c17]Thomas Hirsch, Franz Wotawa
:
Analysing Residual Risks when Introducing Monitoring and Diagnosis into Systems. DSA 2023: 698-709 - [c16]Thomas Hirsch, Birgit Hofer
:
The MAP Metric in Information Retrieval Fault Localization. ASE 2023: 1480-1491 - 2022
- [j7]Thomas Hirsch, Birgit Hofer
:
Using textual bug reports to predict the fault category of software bugs. Array 15: 100189 (2022) - [j6]Thomas Hirsch, Birgit Hofer
:
Detecting non-natural language artifacts for de-noising bug reports. Autom. Softw. Eng. 29(2): 52 (2022) - [j5]Thomas Hirsch, Birgit Hofer
:
A systematic literature review on benchmarks for evaluating debugging approaches. J. Syst. Softw. 192: 111423 (2022) - [c15]Thomas Hirsch, Birgit Hofer
:
Pruning Boolean Expressions to Shorten Dynamic Slices. SCAM 2022: 1-11 - 2021
- [c14]Thomas Hirsch, Birgit Hofer
:
Identifying non-natural language artifacts in bug reports. ASE Workshops 2021: 191-197 - [c13]Thomas Hirsch, Birgit Hofer
:
What we can learn from how programmers debug their code. SER&IP@ICSE 2021: 37-40 - [i5]Thomas Hirsch, Birgit Hofer:
Root cause prediction based on bug reports. CoRR abs/2103.02372 (2021) - [i4]Thomas Hirsch:
A Fault Localization and Debugging Support Framework driven by Bug Tracking Data. CoRR abs/2103.02386 (2021) - [i3]Thomas Hirsch, Birgit Hofer:
What we can learn from how programmers debug their code. CoRR abs/2103.12447 (2021) - [i2]Thomas Hirsch, Birgit Hofer:
Identifying non-natural language artifacts in bug reports. CoRR abs/2110.01336 (2021) - 2020
- [c12]Thomas Hirsch:
A Fault Localization and Debugging Support Framework driven by Bug Tracking Data. ISSRE Workshops 2020: 139-142 - [c11]Thomas Hirsch, Birgit Hofer
:
Root cause prediction based on bug reports. ISSRE Workshops 2020: 171-176
2010 – 2019
- 2019
- [j4]Vincenzo Mancuso, Miguel Peón Quirós
, Cise Midoglu, Mohamed Moulay
, Vincenzo Comite
, Andra Lutu, Özgü Alay, Stefan Alfredsson
, Mohammad Rajiullah, Anna Brunström
, Marco Mellia
, Ali Safari Khatouni
, Thomas Hirsch:
Results from running an experiment as a service platform for mobile broadband networks in Europe. Comput. Commun. 133: 89-101 (2019) - [c10]Thomas Hirsch, Christian Schindler, Matthias Müller
, Thomas Schranz, Wolfgang Slany:
An Approach to Test Classification in Big Android Applications. QRS Companion 2019: 300-308 - 2018
- [c9]Peter Hausler, Christa Genslein, Carina Roth, Thomas Vitzthumecker, Thomas Hirsch
, Rudolf Bierl:
Miniaturized Surface Plasmon Resonance based Sensor System. PHOTOPTICS 2018: 63-66 - 2017
- [c8]Miguel Peón Quirós, Vincenzo Mancuso, Vincenzo Comite, Andra Lutu, Özgü Alay, Stefan Alfredsson, Jonas Karlsson, Anna Brunström, Marco Mellia
, Ali Safari Khatouni
, Thomas Hirsch:
Results from Running an Experiment as a Service Platform for Mobile Networks. WiNTECH 2017: 9-16 - [c7]Özgü Alay, Andra Lutu, Miguel Peón Quirós, Vincenzo Mancuso, Thomas Hirsch, Kristian Evensen, Audun Fosselie Hansen, Stefan Alfredsson, Jonas Karlsson, Anna Brunström, Ali Safari Khatouni
, Marco Mellia
, Marco Ajmone Marsan:
Experience: An Open Platform for Experimentation with Commercial Mobile Broadband Networks. MobiCom 2017: 70-78 - 2016
- [c6]Özgü Alay, Andra Lutu, Rafael García, Miguel Peón Quirós, Vincenzo Mancuso
, Thomas Hirsch, Tobias Dely, Jonas Werme, Kristian Evensen, Audun Fosselie Hansen, Stefan Alfredsson, Jonas Karlsson, Anna Brunström, Ali Safari Khatouni
, Marco Mellia
, Marco Ajmone Marsan, Roberto Monno, Håkon Lønsethagen
:
MONROE, a distributed platform to measure and assess mobile broadband networks: demo. WiNTECH 2016: 85-86 - [c5]Özgü Alay, Andra Lutu, Rafael García, Miguel Peón Quirós, Vincenzo Mancuso
, Thomas Hirsch, Tobias Dely, Jonas Werme, Kristian Evensen, Audun Fosselie Hansen, Stefan Alfredsson, Jonas Karlsson, Anna Brunström, Ali Safari Khatouni
, Marco Mellia
, Marco Ajmone Marsan, Roberto Monno, Håkon Lønsethagen
:
Measuring and assessing mobile broadband networks with MONROE. WoWMoM 2016: 1-3 - 2012
- [j3]Christoph Fenzl, Thomas Hirsch
, Otto S. Wolfbeis:
Photonic Crystal Based Sensor for Organic Solvents and for Solvent-Water Mixtures. Sensors 12(12): 16954-16963 (2012) - 2010
- [j2]Tanja Zseby, Michael Kleis, Thomas Hirsch:
Kooperationsstrategien für Netzwerkmanagement im Internet der Zukunft. Inform. Spektrum 33(2): 160-170 (2010)
2000 – 2009
- 2009
- [c4]Tanja Zseby, Thomas Hirsch, Michael Kleis, Radu Popescu-Zeletin:
Towards a Future Internet: Node Collaboration for Autonomic Communication. Future Internet Assembly 2009: 123-135 - [c3]Cristian Varas, Thomas Hirsch:
Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall. SECURWARE 2009: 179-184 - [i1]Tanja Zseby, Thomas Hirsch:
With Joint Forces - Establishing Situation Awareness for the Future Internet. ERCIM News 2009(77) (2009) - 2008
- [j1]Tanja Zseby, Michael Kleis, Thomas Hirsch:
Self-Protecting Networks - How Cooperation Strategies Can Strengthen Network Security (Selbstschützende Netze - Netzwerksicherheit durch Kooperation). it Inf. Technol. 50(6): 390-396 (2008) - [c2]Tanja Zseby, Thomas Hirsch, Benoit Claise:
Packet Sampling for Flow Accounting: Challenges and Limitations. PAM 2008: 61-71 - 2007
- [c1]Michael Kleis, Thomas Hirsch, Tanja Zseby:
Network Immunity: What can we Learn from Nature for Network Protection? BIONETICS 2007: 283-286
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 01:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint