Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting comprehensible presentation of clone candidates through two-dimensional maximisation., and . Comput. Lang. Syst. Struct., (2015)Discovering parallel pattern candidates in Erlang., , , , , , , , , and . Erlang Workshop, page 13-23. ACM, (2014)Refactorings to Enable Parallelization., , , , , , and . Trends in Functional Programming, volume 8843 of Lecture Notes in Computer Science, page 104-121. Springer, (2014)Clone Wars., , and . SQAMIA, volume 1266 of CEUR Workshop Proceedings, page 15-22. CEUR-WS.org, (2014)Evaluating Scalable Distributed Erlang for Scalability and Reliability, , , , , , , , and . IEEE Transactions on Parallel and Distributed Systems, 28 (8): 2244-2257 (August 2017)What are the critical security flaws in my system?. Erlang Workshop, page 64-71. ACM, (2021)Modelling distributed Erlang within a single node., , and . Erlang Workshop, page 25-36. ACM, (2018)Lesser Evil: Embracing Failure to Protect Overall System Availability., and . DAIS, volume 13272 of Lecture Notes in Computer Science, page 57-73. Springer, (2022)Towards change-driven testing., , and . Erlang Workshop, page 64-65. ACM, (2017)Secure design and verification of Erlang systems.. Erlang Workshop, page 31-40. ACM, (2020)