Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated techniques for provably safe mobile code., , , , and . Theor. Comput. Sci., 290 (2): 1175-1199 (2003)Computational Higher Type Theory IV: Inductive Types., and . CoRR, (2018)A metalanguage for cost-aware denotational semantics., and . CoRR, (2022)Exploring the Adaptability of Word Embeddings to Log Message Classification., and . IM, page 854-859. IEEE, (2021)Efficient Periodicity Analysis for Real-Time Anomaly Detection., and . NOMS, page 1-6. IEEE, (2023)Towards a mechanized metatheory of standard ML., , and . POPL, page 173-184. ACM, (2007)The Essence of ML., and . POPL, page 28-46. ACM Press, (1988)long version: TOPLAS 15(2): 211-252 (1993).Cache and I/O efficent functional algorithms., and . POPL, page 39-50. ACM, (2013)Adaptive functional programming., , and . POPL, page 247-259. ACM, (2002)ACM SIGPLAN Notices 37(1), January 2002.Typed Closure Conversion for Recursively-Defined Functions., and . HOOTS, volume 10 of Electronic Notes in Theoretical Computer Science, page 230-241. Elsevier, (1997)