Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incremental resource usage analysis., , , and . PEPM, page 25-34. ACM, (2012)Abstract Interpretation with Specialized Definitions., , and . SAS, volume 4134 of Lecture Notes in Computer Science, page 107-126. Springer, (2006)Static Inference of Transmission Data Sizes in Distributed Systems., , , and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 104-119. Springer, (2014)EthIR: A Framework for High-Level Analysis of Ethereum Bytecode., , , , and . ATVA, volume 11138 of Lecture Notes in Computer Science, page 513-520. Springer, (2018)Efficient local unfolding with ancestor stacks., , and . Theory Pract. Log. Program., 11 (1): 1-32 (2011)Analyzing Smart Contracts: From EVM to a sound Control-Flow Graph., , , , and . CoRR, (2020)Abstraction-Carrying Code: a Model for Mobile Code Safety., , and . New Generation Comput., 26 (2): 171-204 (2008)List-Processing Optimizations in a Multi-Paradigm Declarative Language., , , and . WFLP, page 184-194. (2000)Polygenetic Partial Evaluation of Lazy Functional Logic Programs., , , , and . APPIA-GULP-PRODE, page 151-164. (1998)Some Issues on Incremental Abstraction-Carrying Code, , and . CoRR, (2007)