Author of the publication

Native Client: A Sandbox for Portable, Untrusted x86 Native Code.

, , , , , , , , and . IEEE Symposium on Security and Privacy, page 79-93. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adapting Software Fault Isolation to Contemporary CPU Architectures., , , , , , , and . USENIX Security Symposium, page 1-12. USENIX Association, (2010)Fortran-Style Transformations for Functional Programs., , and . ICPP (2), page 282-283. CRC Press, (1991)Loop Transformations for Prolog Programs., , and . LCPC, volume 768 of Lecture Notes in Computer Science, page 374-389. Springer, (1993)The compiler as a validation and evaluation tool., , and . COCV@ETAPS, volume 82 of Electronic Notes in Theoretical Computer Science, page 443-460. Elsevier, (2003)An Advanced Optimizer for the IA-64 Architecture., , , , , , and . IEEE Micro, 20 (6): 60-68 (2000)Estimating the Ingerent Parallelism in Prolog Programs., and . FGCS, page 783-790. IOS Press, (1992)OR parallel execution of Prolog programs with side effects., , and . J. Supercomput., 2 (2): 209-223 (1988)Prolog at the University of Illinois., , , , , , , and . COMPCON, page 68-73. IEEE Computer Society, (1988)Guest Editor's Introduction.. Int. J. Parallel Program., 26 (1): 3-4 (1998)On the Importance of Points-to Analysis and Other Memory Disambiguation Methods for C Programs., , and . PLDI, page 47-58. ACM, (2001)