Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modules in wyvern: advanced control over security and privacy., , and . HotSoS, page 68. ACM, (2016)A Capability-Based Module System for Authority Control (Artifact)., , , and . Dagstuhl Artifacts Ser., 3 (2): 02:1-02:2 (2017)Psamathe: A DSL with Flows for Safe Blockchain Assets., , and . CoRR, (2020)Reasonably programmable literal notation., and . Proc. ACM Program. Lang., 2 (ICFP): 106:1-106:32 (2018)Plan B: Design Methodology for Cyber-Physical Systems Robust to Timing Failures., , , , , , , , , and 1 other author(s). ACM Trans. Cyber Phys. Syst., 6 (3): 21:1-21:39 (2022)Discovering Architectures from Running Systems., , , , and . IEEE Trans. Software Eng., 32 (7): 454-466 (2006)An Empirical Study of Protocols in Smart Contracts., , and . CoRR, (2021)Sound Gradual Verification with Symbolic Execution., , and . CoRR, (2023)Tool support for statically checking the structural conformance of an object-oriented system to its runtime architecture., and . OOPSLA Companion, page 741-742. ACM, (2008)Young guns/object orientation: the next generation., , , , , , , , , and 1 other author(s). OOPSLA Companion, page 940-942. ACM, (2006)