Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A semantics-based approach to malware detection., , , and . ACM Trans. Program. Lang. Syst., 30 (5): 25:1-25:54 (2008)On the Existence and Construction of Robust Communication Protocals for Unreliable Channels., , and . FSTTCS, volume 181 of Lecture Notes in Computer Science, page 136-151. Springer, (1984)Non-Failure Analysis for Logic Programs., , and . ICLP, page 48-62. MIT Press, (1997)Understanding Finiteness Analysis Using Abstract Interpretation., , and . JICSLP, page 735-749. MIT Press, (1992)jc: An Efficient and Portable Sequential Implementation of Janus., , and . JICSLP, page 399-413. MIT Press, (1992)A Simple Code Improvement Scheme for Prolog.. ICLP, page 17-32. MIT Press, (1989)long version: JLP 13: 57-88 (1992).Functional Computations in Logic Programs., and . ACM Trans. Program. Lang. Syst., 11 (3): 451-481 (1989)Alias Analysis of Executable Code., , and . POPL, page 12-24. ACM, (1998)Guest Editor's Introduction., , , and . J. Log. Program., (1994)Detection and Optimization of Suspension-Free Logic Programs., , and . J. Log. Program., 29 (1-3): 171-194 (1996)