Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unified Model for Context-Sensitive Program Analyses: : The Blind Men and the Elephant., , and . ACM Comput. Surv., 54 (6): 114:1-114:37 (2022)Controlling Control Flow in Web Applications., and . WWV, volume 200 of Electronic Notes in Theoretical Computer Science, page 119-131. Elsevier, (2007)ParaDox: Eliminating Voltage Margins via Heterogeneous Fault Tolerance., , , and . HPCA, page 520-532. IEEE, (2021)Galois connecting call-by-value and call-by-name., and . Log. Methods Comput. Sci., (2024)An Efficient and Scalable Platform for Java Source Code Analysis Using Overlaid Graph Representations., , and . IEEE Access, (2020)Efficient and Correct Stencil Computation via Pattern Matching and Static Typing, and . DSL, volume 66 of EPTCS, page 68-92. (2011)Source code patches from dynamic analysis., and . FTfJP@ECOOP, page 1-8. ACM, (2021)Refactoring traces to identify concurrency improvements., and . FTfJP@ECOOP, page 16-23. ACM, (2021)Data-Flow Analyses as Effects and Graded Monads., , and . FSCD, volume 167 of LIPIcs, page 15:1-15:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Extended Call-by-Push-Value: Reasoning About Effectful Programs and Evaluation Order., and . ESOP, volume 11423 of Lecture Notes in Computer Science, page 235-262. Springer, (2019)