Author of the publication

Set Constraints for Destructive Array Update Optimization.

, and . ICCL, page 184-195. IEEE Computer Society, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compiler Correctness for Concurrent Languages., and . COORDINATION, volume 1061 of Lecture Notes in Computer Science, page 231-248. Springer, (1996)Bisimulations for Untyped Imperative Objects., and . ESOP, volume 3924 of Lecture Notes in Computer Science, page 146-161. Springer, (2006)Continuations and Coroutines., , and . LISP and Functional Programming, page 293-298. ACM, (1984)Selective Thunkification., and . SAS, volume 864 of Lecture Notes in Computer Science, page 162-178. Springer, (1994)Conditional Lambda-Theories and the Verification of Static Properties of Programs, and . LICS, page 321-332. IEEE Computer Society, (1990)The Higher-Order Aggregate Update Problem., and . VMCAI, volume 5403 of Lecture Notes in Computer Science, page 44-58. Springer, (2009)Untyped Lambda-Calculus with Input-Output., and . CAAP, volume 1059 of Lecture Notes in Computer Science, page 317-329. Springer, (1996)Specifications, Models, and Implementations of Data Abstractions.. Theor. Comput. Sci., (1982)Set constraints for destructive array update optimization., and . J. Funct. Program., 11 (3): 319-346 (2001)Recursive programming through table look-up., , and . SYMSACC, page 85-89. ACM, (1976)