Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of Snapshot Isolation in Transactional Memory Java Programs., , , and . ECOOP, volume 7313 of Lecture Notes in Computer Science, page 640-664. Springer, (2012)Hoogle⋆: Constants and λ-abstractions in Petri-net-based Synthesis using Symbolic Execution (Artifact)., , and . Dagstuhl Artifacts Ser., 9 (2): 20:1-20:3 (2023)Component J: A component-based programming language with dynamic reconfiguration., , and . Comput. Sci. Inf. Syst., 5 (2): 63-86 (2008)Subtyping First-Class Polymorphic Components., and . ESOP, volume 3444 of Lecture Notes in Computer Science, page 342-356. Springer, (2005)Towards an augmented reality approach to build use-case diagrams., , , and . ER (Companion), volume 3618 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Derivations with Holes for Concept-Based Program Synthesis., , , , and . Onward!, page 63-79. ACM, (2022)OSTRICH: a rich template language for low-code development (extended version)., , , and . Softw. Syst. Model., 22 (5): 1645-1663 (October 2023)CHAMELEON: OutSystems Live Bidirectional Transformations., , , , , , and . CoRR, (2023)Capability-based localization of distributed and heterogeneous queries., , and . J. Funct. Program., (2017)Data-Dependent Confidentiality in DCR Graphs., , and . PPDP, page 7:1-7:13. ACM, (2023)