Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A type system for regular expressions., , and . FTfJP@ECOOP, page 20-26. ACM, (2012)Key-dependency for a wavelet-based blind watermarking algorithm., , and . MM&Sec, page 175-179. ACM, (2004)Java UI : Effects for Controlling UI Object Access., , , and . ECOOP, volume 7920 of Lecture Notes in Computer Science, page 179-204. Springer, (2013)Protection of wavelet-based watermarking systems using filter parametrization., , and . Signal Process., 83 (10): 2095-2116 (2003)EnerJ: approximate data types for safe and general low-power computation., , , , , and . PLDI, page 164-174. ACM, (2011)OppropBERL: A GNN and BERT-Style Reinforcement Learning-Based Type Inference., and . SANER, page 131-136. IEEE, (2024)Key-dependent pyramidal wavelet domains for secure watermark embedding., , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 728-. SPIE, (2003)Tunable Static Inference for Generic Universe Types., , and . ECOOP, volume 6813 of Lecture Notes in Computer Science, page 333-357. Springer, (2011)Verification games: making verification fun., , , , , , , and . FTfJP@ECOOP, page 42-49. ACM, (2012)Building and using pluggable type-checkers., , , , and . ICSE, page 681-690. ACM, (2011)