Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lint-Based Warnings in Python Code: Frequency, Awareness and Refactoring., , , , , and . SCAM, page 208-218. IEEE, (2022)Automatically Checking Feature Model Refactorings., , and . J. Univers. Comput. Sci., 17 (5): 684-711 (2011)Selected papers from the Brazilian Symposiums on Formal Methods (SBMF 2012 and 2013)., and . Sci. Comput. Program., (2015)Enhancing conformance checking for contract-based programs., , and . SPLASH (Companion Volume), page 57-58. ACM, (2014)An empirical study on configuration-related issues: investigating undeclared and unused identifiers., , , , and . GPCE, page 35-44. ACM, (2015)Java reflection API: revealing the dark side of the mirror., , , , and . ESEC/SIGSOFT FSE, page 636-646. ACM, (2019)Mutation Operators for Java Streams., , , , , and . SAST, page 59-68. ACM, (2022)Identifying overly strong conditions in refactoring implementations., , and . ICSM, page 173-182. IEEE Computer Society, (2011)Revisiting Refactoring Mechanics from Tool Developers' Perspective., , , , , and . SBMF, volume 12475 of Lecture Notes in Computer Science, page 25-42. Springer, (2020)Refactoring Alloy Specifications, and . Electronic Notes in Theoretical Computer Science, (May 2004)