Author of the publication

A programming model for reconfigurable computing based in functional concurrency.

, , , , and . ReCoSoC, page 1-8. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving information flow security through monadic control of effects., and . Journal of Computer Security, 17 (5): 599-653 (2009)Semantics-directed machine architecture in ReWire., , , , and . FPT, page 446-449. IEEE, (2013)Verifiable Security Templates for Hardware., and . DATE, page 658-661. IEEE, (2020)Proof Abstraction for Imperative Languages.. APLAS, volume 4279 of Lecture Notes in Computer Science, page 97-113. Springer, (2006)The Confinement Problem in the Presence of Faults., , and . ICFEM, volume 7635 of Lecture Notes in Computer Science, page 182-197. Springer, (2012)Language Abstractions for Hardware-based Control-Flow Integrity Monitoring., and . ReConFig, page 1-6. IEEE, (2018)Formalized High Level Synthesis with Applications to Cryptographic Hardware., , , , , , and . NFM, volume 13903 of Lecture Notes in Computer Science, page 332-352. Springer, (2023)The logic of demand in Haskell., and . J. Funct. Program., 15 (5): 837-891 (2005)A core calculus for secure hardware: its formal semantics and proof system., , , and . MEMOCODE, page 122-131. ACM, (2017)The Design of a Practical Proof Checker for a Lazy Functional Language., , and . Trends in Functional Programming, volume 7829 of Lecture Notes in Computer Science, page 117-132. Springer, (2012)