Author of the publication

An Extension of System F with Subtyping.

, , , and . TACS, volume 526 of Lecture Notes in Computer Science, page 750-770. Springer, (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parametricity and Variants of Girard's J Operator., and . Inf. Process. Lett., 70 (1): 1-5 (1999)Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods., and . WOOT, USENIX Association, (2008)The Development of Type Systems for Object-Oriented Languages., and . Theory Pract. Object Syst., 1 (3): 189-220 (1995)A Learning-Based Approach to Reactive Security, , , , , and . CoRR, (2009)The analysis of programming structure., and . SIGACT News, 28 (2): 24-31 (1997)On the Type Structure of Standard ML., and . ACM Trans. Program. Lang. Syst., 15 (2): 211-252 (1993)preliminary version: POPL 1988: 28-46.Connecting Formal Semantics to Constructive Intuitions., , and . Constructivity in Computer Science, volume 613 of Lecture Notes in Computer Science, page 1-21. Springer, (1991)Probabilistic Polynomial-Time Semantics for a Protocol Security Logic., , , , and . ICALP, volume 3580 of Lecture Notes in Computer Science, page 16-29. Springer, (2005)DATALOG with Constraints: A Foundation for Trust Management Languages., and . PADL, volume 2562 of Lecture Notes in Computer Science, page 58-73. Springer, (2003)Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs., , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 133-149. Springer, (2011)