Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compilation of Functional Languages by Program Transformation., and . ACM Trans. Program. Lang. Syst., 13 (1): 21-51 (1991)ACE: An Automatic Complexity Evaluator.. ACM Trans. Program. Lang. Syst., 10 (2): 248-266 (1988)Program Analysis for Software Engineering: New Applications, New Requirements, New Tools.. ACM Comput. Surv., 28 (4es): 167 (1996)Privacy Risk Analysis to Enable Informed Privacy Settings., and . EuroS&P Workshops, page 95-102. IEEE, (2018)Parallel Machines for Multiset Transformation and their Programming Style / Parallele Maschinen für die Multimengen-Transformation und deren Programmierstil., , and . it Inf. Technol., 30 (2): 99-109 (1988)Introduction to Gamma., and . Research Directions in High-Level Parallel Programming Languages, volume 574 of Lecture Notes in Computer Science, page 197-202. Springer, (1991)The Chemical Reaction Model.. Research Directions in High-Level Parallel Programming Languages, volume 574 of Lecture Notes in Computer Science, page 196. Springer, (1991)Automated consent through privacy agents: Legal requirements and technical architecture., and . Comput. Law Secur. Rev., 25 (2): 136-144 (2009)Model Checking Security Properties of Control Flow Graphs., , and . J. Comput. Secur., 9 (3): 217-250 (2001)Shape Types., and . POPL, page 27-39. ACM Press, (1997)