Author of the publication

Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N).

, , , and . ASE, page 641-646. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing behavioral constraints in evolving aspect-oriented programs., , and . FOAL, page 19-28. ACM, (2008)An Empirical Study of Refactorings and Technical Debt in Machine Learning Systems., , , , , and . ICSE, page 238-250. IEEE, (2021)Automated Refactoring of Legacy Java Software to Enumerated Types., , and . ICSM, page 224-233. IEEE Computer Society, (2007)Proactive Empirical Assessment of New Language Feature Adoption via Automated Refactoring: The Case of Java 8 Default Methods., and . CoRR, (2018)Challenges in Migrating Imperative Deep Learning Programs to Graph Execution: An Empirical Study., , , and . MSR, page 469-481. ACM, (2022)Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Graph Execution., , , , and . ASE, page 1800-1802. IEEE, (2023)Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software., and . SCAM, page 261-262. IEEE Computer Society, (2008)Keine Geheimnisse - Julian Assanges Mission der totalen Transparenz. Portrait eines Getriebenen. Wikileaks und die Folgen, Suhrkamp, Berlin, 1 edition, (2011)Rely-guarantee approach to reasoning about aspect-oriented programs., and . SPLAT, volume 217 of ACM International Conference Proceeding Series, page 5. ACM, (2007)Going big: a large-scale study on what big data developers ask., and . ESEC/SIGSOFT FSE, page 432-442. ACM, (2019)