Author of the publication

A Tree-Based Alternative to Java Byte-Codes.

, and . International Journal of Parallel Programming, 27 (1): 21-33 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DFI: An Interprocedural Value-Flow Analysis Framework that Scales to Large Codebases., , and . CoRR, (2022)A Multilevel Introspective Dynamic Optimization System For Holistic Power-Aware Computing., , and . Power-aware Computing Systems, volume 05141 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2005)Optimization of dynamic languages using hierarchical layering of virtual machines., , and . DLS, page 79-88. ACM, (2009)Oberon - The Overlooked Jewel.. The School of Niklaus Wirth, page 41-54. dpunkt.verlag/Copublication with Morgan-Kaufmann, (2000)Slim Binaries, and . Commun. ACM, 40 (12): 87--94 (1997)dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting., , , , and . EuroSec@EuroSys, page 41-47. ACM, (2021)Implementing fast JVM interpreters using Java itself., , and . PPPJ, volume 272 of ACM International Conference Proceeding Series, page 145-154. ACM, (2007)ACM SIGPLAN international workshop on programming language and systems technologies for internet clients: (PLASTIC 2011)., , and . OOPSLA Companion, page 331-332. ACM, (2011)Method for Using IMU-Based Experimental Motion Data in BVH Format for Musculoskeletal Simulations via OpenSim., , , , , , , , , and . Sensors, 23 (12): 5423 (2023)V0LTpwn: Attacking x86 Processor Integrity from Software., , , , and . USENIX Security Symposium, page 1445-1461. USENIX Association, (2020)