Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing Least Privilege Memory Views for Multithreaded Applications., , , and . ACM Conference on Computer and Communications Security, page 393-405. ACM, (2016)Aspect-Based Introspection and Change Analysis for Evolving Programs., , , and . RAM-SE, page 59-70. Fakultät für Informatik, Universität Magdeburg, (2007)Trading obliviousness for modularity with cooperative aspect-oriented programming., and . ACM Trans. Softw. Eng. Methodol., 22 (3): 22:1-22:46 (2013)Towards reusable components with aspects: an empirical study on modularity and obliviousness., and . ICSE, page 91-100. ACM, (2008)Cooperative aspect-oriented programming., and . Sci. Comput. Program., 74 (5-6): 333-354 (2009)Bridging Java and AspectJ through explicit join points., and . PPPJ, volume 272 of ACM International Conference Proceeding Series, page 63-72. ACM, (2007)A survey of attack and defense techniques for reputation systems., , and . ACM Comput. Surv., 42 (1): 1:1-1:31 (2009)Ribbons: a partially shared memory programming model., , and . OOPSLA, page 289-306. ACM, (2011)Semantics-aware trace analysis., , and . PLDI, page 453-464. ACM, (2009)