Author of the publication

Towards safe refactoring for intelligent parallelization of Java 8 streams.

, , , and . ICSE (Companion Volume), page 206-207. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing behavioral constraints in evolving aspect-oriented programs., , and . FOAL, page 19-28. ACM, (2008)An Empirical Study of Refactorings and Technical Debt in Machine Learning Systems., , , , , and . ICSE, page 238-250. IEEE, (2021)Towards safe refactoring for intelligent parallelization of Java 8 streams., , , and . ICSE (Companion Volume), page 206-207. ACM, (2018)Keine Geheimnisse - Julian Assanges Mission der totalen Transparenz. Portrait eines Getriebenen. Wikileaks und die Folgen, Suhrkamp, Berlin, 1 edition, (2011)Rely-guarantee approach to reasoning about aspect-oriented programs., and . SPLAT, volume 217 of ACM International Conference Proceeding Series, page 5. ACM, (2007)Going big: a large-scale study on what big data developers ask., and . ESEC/SIGSOFT FSE, page 432-442. ACM, (2019)Proactive Empirical Assessment of New Language Feature Adoption via Automated Refactoring: The Case of Java 8 Default Methods., and . CoRR, (2018)Automated Refactoring of Legacy Java Software to Enumerated Types., , and . ICSM, page 224-233. IEEE Computer Society, (2007)Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Graph Execution., , , , and . ASE, page 1800-1802. IEEE, (2023)Challenges in Migrating Imperative Deep Learning Programs to Graph Execution: An Empirical Study., , , and . MSR, page 469-481. ACM, (2022)