Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lagrange's Theorem for Binary Squares., , , and . CoRR, (2017)Automated Reasoning and Natural Proofs for Programs Manipulating Data Structures.. FSTTCS, volume 18 of LIPIcs, page 34-35. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2012)Natural proofs for structure, data, and separation., , , and . PLDI, page 231-242. ACM, (2013)CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks., , and . ACM Trans. Inf. Syst. Secur., 13 (2): 14:1-14:39 (2010)The Language Theory of Bounded Context-Switching., , and . LATIN, volume 6034 of Lecture Notes in Computer Science, page 96-107. Springer, (2010)Reachability in Concurrent Uninterpreted Programs., and . FSTTCS, volume 150 of LIPIcs, page 46:1-46:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Analyzing recursive programs using a fixed-point calculus., , and . PLDI, page 211-222. ACM, (2009)Analyzing temporal role based access control models., , , , , , and . SACMAT, page 177-186. ACM, (2012)Synthesizing Reactive Programs.. CSL, volume 12 of LIPIcs, page 428-442. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2011)A Robust Class of Context-Sensitive Languages., , and . LICS, page 161-170. IEEE Computer Society, (2007)