Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is It Dangerous to Use Version Control Histories to Study Source Code Evolution?, , , , and . Proceedings of the 26th European conference on Object-Oriented Programming, page 79-103. (June 2012)A Compositional Paradigm of Automating Refactorings., , , , and . ECOOP, volume 7920 of Lecture Notes in Computer Science, page 527-551. Springer, (2013)Mining fine-grained code changes to detect unknown change patterns., , , and . ICSE, page 803-813. ACM, (2014)Refactoring and the evolution of Fortran., , and . SE-CSE@ICSE, page 28-34. IEEE Computer Society, (2009)Inferring ownership transfer for efficient message passing., , and . PPoPP, page 81-90. ACM, (2011)Keshmesh: a tool for detecting and fixing java concurrency bug patterns., , , and . OOPSLA Companion, page 39-40. ACM, (2011)Automatic Handling of Global Variables for Multi-threaded MPI Programs., , , , and . ICPADS, page 220-227. IEEE Computer Society, (2011)ReBA: refactoring-aware binary adaptation of evolving libraries., , , and . ICSE, page 441-450. ACM, (2008)ReBA: a tool for generating binary adapters for evolving java libraries., , , and . ICSE Companion, page 963-964. ACM, (2008)978-1-60558-079-1.The need for richer refactoring usage data., , , , , and . PLATEAU, page 31-38. ACM, (2011)