Author of the publication

Achieving information flow security through monadic control of effects.

, and . Journal of Computer Security, 17 (5): 599-653 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Software Engineering Experiment in Software Component Generation., , , , , , , , , and . ICSE, page 542-552. IEEE Computer Society, (1996)Software design for reliability and reuse: a proof-of-concept demonstration., , , , , , , , , and 2 other author(s). TRI-Ada, page 396-404. ACM, (1994)Achieving information flow security through monadic control of effects., and . Journal of Computer Security, 17 (5): 599-653 (2009)Performance analysis of asynchronous parallel Jacobi., and . Numer. Algorithms, 77 (3): 831-866 (2018)Haskell as an Automation Controller., , and . Advanced Functional Programming, volume 1608 of Lecture Notes in Computer Science, page 268-289. Springer, (1998)The Romulus Proof Checker., , , , and . CADE, volume 449 of Lecture Notes in Computer Science, page 651-652. Springer, (1990)Max-plus statistical leverage scores.. CoRR, (2016)Static Single Assignment for Explicitely Parallel Programs., , and . POPL, page 260-272. ACM Press, (1993)Max-Plus Algebraic Statistical Leverage Scores.. SIAM J. Matrix Anal. Appl., 38 (4): 1410-1433 (2017)Monads, Indexes and Transformations., and . TAPSOFT, volume 668 of Lecture Notes in Computer Science, page 314-327. Springer, (1993)