Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deconstructing yield Operator to Enhance Streams Processing., and . ICSOFT, page 143-150. SCITEPRESS, (2021)Lightweight Identification of Captured Memory for Software Transactional Memory., and . ICA3PP (1), volume 8285 of Lecture Notes in Computer Science, page 15-29. Springer, (2013)STM with Transparent API Considered Harmful., and . ICA3PP (1), volume 7016 of Lecture Notes in Computer Science, page 326-337. Springer, (2011)Runtime elision of transactional barriers for captured memory., and . PPoPP, page 303-304. ACM, (2013)Enhancing SSR in Low-Thread Web Servers: A Comprehensive Approach for Progressive Server-Side Rendering with any Asynchronous API and Multiple Data Models., and . WEBIST, page 37-48. SCITEPRESS, (2023)An Adviser for Efficiently Resolve Email Feature Interactions., and . AICT/ICIW, page 175. IEEE Computer Society, (2006)Optimizing memory transactions for large-scale programs., and . J. Parallel Distributed Comput., (2016)Text Web Templates Considered Harmful., , and . WEBIST (Revised Selected Papers), volume 399 of Lecture Notes in Business Information Processing, page 69-95. Springer, (2019)HoT: Unleash Web Views with Higher-order Templates., and . WEBIST, page 118-129. ScitePress, (2019)