Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is Kernel Code Different From Non-Kernel Code? A Case Study of BSD Family Operating Systems., , , and . ICSME, page 211-222. IEEE, (2022)The Evolving Landscape of Software Performance Engineering., , and . EASE, page 260-261. ACM, (2022)When malloc() Never Returns NULL - Reliability as an Illusion., , , , and . ISSRE Workshops, page 31-36. IEEE, (2022)Quantifying Daily Evolution of Mobile Software Based on Memory Allocator Churn., , , , and . MOBILESoft, page 28-32. IEEE, (2022)Scalable Software Libraries., , , and . SIGSOFT FSE, page 191-199. ACM, (1993)On Quantifying the Benefits of Dead Code Removal., , , and . ICSME, page 563. IEEE, (2022)There Ain't No Such Thing as a Free Custom Memory Allocator., , , , and . ICSME, page 578-581. IEEE, (2022)What Do You Mean by Memory? When Engineers Are Lost in the Maze of Complexity., , , and . ICSE-SEIP, page 405-407. ACM, (2024)Reengineering a Complex Application Using a Scalable Data Structure Compiler., , and . SIGSOFT FSE, page 111-120. ACM, (1994)Who Ate My Memory? Towards Attribution in Memory Management., , , and . ICSE-SEIP, page 381-383. IEEE, (2023)