Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Refactoring Java programs for flexible locking., , , and . ICSE, page 71-80. ACM, (2011)The Flow-Insensitive Precision of Andersen's Analysis in Practice., , , and . SAS, volume 6887 of Lecture Notes in Computer Science, page 60-76. Springer, (2011)DejaVu: deterministic Java replay debugger for Jalapeño Java virtual machine., , , and . OOPSLA Addendum, page 165-166. ACM, (2000)Effective race detection for event-driven programs., , and . OOPSLA, page 151-166. ACM, (2013)I¿¿¿: a calculus for internet of things automation., , , , and . Onward!, page 119-133. ACM, (2017)PSE: explaining program failures via postmortem static analysis., , , , and . SIGSOFT FSE, page 63-72. ACM, (2004)Software economies., , , , , , and . FoSER, page 7-12. ACM, (2010)Automatic Root Cause Quantification for Missing Edges in JavaScript Call Graphs., , , and . ECOOP, volume 222 of LIPIcs, page 3:1-3:28. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)TAJ: effective taint analysis of web applications., , , , and . PLDI, page 87-97. ACM, (2009)Verifying object construction., , , , and . ICSE, page 1447-1458. ACM, (2020)