Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are PHP applications ready for Hack?, , , and . SANER, page 63-72. IEEE Computer Society, (2015)Linguistic Driven Refactoring of Source Code Identifiers.. WCRE, page 297-300. IEEE Computer Society, (2010)Accurate and efficient refactoring detection in commit history., , , , and . ICSE, page 483-494. ACM, (2018)Physical and conceptual identifier dispersion: Measures and relation to fault proneness., , , , and . ICSM, page 1-5. IEEE Computer Society, (2010)Comprehension and Dependency Analysis of Aspect-Oriented Programs through Declarative Reasoning., , and . PADL, volume 4902 of Lecture Notes in Computer Science, page 35-52. Springer, (2008)JSDeodorant: class-awareness for JavaScript programs., , , and . ICSE (Companion Volume), page 71-74. IEEE Computer Society, (2017)REPENT: Analyzing the Nature of Identifier Renamings., , , , , and . IEEE Trans. Software Eng., 40 (5): 502-532 (2014)Overcoming comprehension barriers in the AspectJ programming language., , , and . Journal of Object Technology, 7 (6): 121-142 (2008)Detecting Function Constructors in JavaScript., , , and . ICSME, page 488-492. IEEE Computer Society, (2016)Special Issue of PPAP 2013: Preface., , , , and . ECEASST, (2013)