Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Plan B: Design Methodology for Cyber-Physical Systems Robust to Timing Failures., , , , , , , , , and 1 other author(s). ACM Trans. Cyber Phys. Syst., 6 (3): 21:1-21:39 (2022)Sound Gradual Verification with Symbolic Execution., , and . CoRR, (2023)Discovering Architectures from Running Systems, , , , and . Transactions on Software Engineering, 32 (7): 454--466 (2006)Modules in wyvern: advanced control over security and privacy., , and . HotSoS, page 68. ACM, (2016)A Capability-Based Module System for Authority Control (Artifact)., , , and . Dagstuhl Artifacts Ser., 3 (2): 02:1-02:2 (2017)Verifying correct usage of atomic blocks and typestate., , and . OOPSLA, page 227-244. ACM, (2008)Tool support for statically checking the structural conformance of an object-oriented system to its runtime architecture., and . OOPSLA Companion, page 741-742. ACM, (2008)Young guns/object orientation: the next generation., , , , , , , , , and 1 other author(s). OOPSLA Companion, page 940-942. ACM, (2006)Checking framework plugins., and . OOPSLA Companion, page 795-796. ACM, (2007)Statically checking API protocol conformance with mined multi-object specifications., , , and . ICSE, page 925-935. IEEE Computer Society, (2012)