Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Failure Causes in Java Programs: An Application of Change Impact Analysis., , and . IEEE Trans. Software Eng., 32 (9): 718-732 (2006)Proving Relative Lower Bounds for Incremental Algorithms., , and . Acta Inf., 27 (7): 665-683 (1990)Exploring the impact of context sensitivity on blended analysis., , , and . ICSM, page 1-10. IEEE Computer Society, (2010)Directed Tracing to Detect Race Conditions., and . ICPP (2), page 247-250. CRC Press, (1992)Parameterized object sensitivity for points-to and side-effect analyses for Java., , and . ISSTA, page 1-11. ACM, (2002)A Model of Ada Programs for Static Deadlock Detection in Polynomial Time., and . Workshop on Parallel and Distributed Debugging, page 97-107. ACM, (1991)Lattice Frameworks for Multiscore and Bidirectional Data Flow Problems., , and . ACM Trans. Program. Lang. Syst., 17 (5): 777-803 (1995)Points-To Analysis for Java using Annotated Constraints., , and . OOPSLA, page 43-55. ACM, (2001)SIGPLAN Notices 36(11).Experiments with Combined Analysis for Pointer Aliasing., , and . PASTE, page 11-18. ACM, (1998)Data-Flow-Based Virtual Function Resolution., and . SAS, volume 1145 of Lecture Notes in Computer Science, page 238-254. Springer, (1996)