Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient recovery of algebraic specifications for stateful components., , and . IWPSE, page 98-105. ACM, (2007)Use at your own risk: the Java unsafe API in the wild., , , , , and . OOPSLA, page 695-710. ACM, (2015)Understanding and Classifying the Quality of Technical Forum Questions., , , and . QSIC, page 343-352. IEEE, (2014)Quantifying Program Comprehension with Interaction Data., , , and . QSIC, page 276-285. IEEE, (2014)What Makes a Satisficing Bug Report?, , and . QRS, page 164-174. IEEE, (2016)The code time machine., , , and . ICPC, page 356-359. IEEE Computer Society, (2017)Welcome from the chairs., and . MAINT@SANER, page 1-2. IEEE, (2018)Using Graph Transformation Systems to Specify and Verify Data Abstractions, , , and . Proceedings of the Seventh International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2008), volume X of Electronic Communications of the EASST, page 277--290. EASST, European Association of Software Science and Technology, (March 2008)Enhanced modeling of DC-DC power converters by means of averaging technique., , , and . IECON, page 5101-5107. IEEE, (2014)Summarizing Complex Development Artifacts by Mining Heterogeneous Data., , and . MSR, page 401-405. IEEE Computer Society, (2015)