Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regular Packings of PG (3, q)., and . Eur. J. Comb., 19 (6): 713-720 (1998)ThreadLock: Native Principal Isolation Through Memory Protection Keys., , and . AsiaCCS, page 966-979. ACM, (2023)A Dependently Typed Language with Dynamic Equality., , , , and . TyDe@ICFP, page 44-57. ACM, (2023)Dependent Types for Multi-Rate Flows in Synchronous Programming., and . ML Family/OCaml, volume 241 of EPTCS, page 36-44. (2015)HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing., , , , , , and . NDSS, The Internet Society, (2020)Session Types in a Linearly Typed Multi-Threaded Lambda-Calculus., , , and . CoRR, (2016)HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing., , , , , , and . ACM Trans. Priv. Secur., 25 (4): 33:1-33:35 (2022)MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys., , and . DIMVA, volume 13358 of Lecture Notes in Computer Science, page 136-155. Springer, (2022)FlexFilt: Towards Flexible Instruction Filtering for Security., , , , and . ACSAC, page 646-659. ACM, (2021)Efficient Gaussian Mixture Modeling of Long-Range 2-D Radar Measurements., and . IEEE Trans. Aerosp. Electron. Syst., 59 (2): 1935-1945 (April 2023)