From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Aspects and class-based security: a survey of interactions between advice weaving and the Java 2 security model., , и . VMIL@SPLASH, стр. 3:1-3:7. ACM, (2008)Atom Ranking Extensions, и . Internet Draft draft-snell-atompub-feed-index-10, (августа 2006)VM performance evaluation with functional models: an optimist's outlook., , и . VMIL@SPLASH, стр. 6:1-6:2. ACM, (2009)Encoding the Java Virtual Machine's Instruction Set., и . Bytecode@ETAPS, том 264 из Electronic Notes in Theoretical Computer Science, стр. 35-50. Elsevier, (2010)Optimizing the evaluation of patterns in pointcuts., , и . VMIL@SPLASH, стр. 2:1-2:10. ACM, (2010)Magic for the masses: safer high-level low-level programming through customizable static analyses., , и . MISS@AOSD, стр. 13-17. ACM, (2011)