Author of the publication

Program Transformation to Identify Parallel Skeletons.

, and . PDP, page 486-494. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Higher Order Deforestation.. Fundam. Informaticae, 69 (1-2): 39-61 (2006)A Taxonomy for Triggered Interactions Using Fair Object Semantics., , and . FIW, page 193-209. IOS Press, (2000)Compile-Time Garbage Collection for Lazy Functional Languages. IWMM, volume 986 of Lecture Notes in Computer Science, page 119-144. Springer, (1995)Proving the Correctness of Unfold/Fold Program Transformations Using Bisimulation., and . Ershov Memorial Conference, volume 7162 of Lecture Notes in Computer Science, page 153-169. Springer, (2011)Usage Counting Analysis for Lazy Functional Languages.. Inf. Comput., 146 (2): 100-137 (1998)Detecting Man-in-the-Middle Attacks by Precise Timing., and . SECURWARE, page 81-86. IEEE Computer Society, (2009)Generating Loop Invariants for Program Verification by Transformation.. VPT@ETAPS, volume 253 of EPTCS, page 36-53. (2017)Program Transformation to Identify Parallel Skeletons., and . PDP, page 486-494. IEEE Computer Society, (2016)Asymptotic Speedups, Bisimulation and Distillation (Work in Progress)., and . Ershov Memorial Conference, volume 8974 of Lecture Notes in Computer Science, page 177-185. Springer, (2014)Extracting the Essence of Distillation.. Ershov Memorial Conference, volume 5947 of Lecture Notes in Computer Science, page 151-164. Springer, (2009)