Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pipelines and Beyond: Graph Types for ADTs with Futures., , , and . Proc. ACM Program. Lang., 8 (POPL): 482-511 (January 2024)SECOMP: Formally Secure Compilation of Compartmentalized C Programs., , , , , , , and . CoRR, (2024)Bunched Fuzz: Sensitivity for Vector Metrics., , , and . ESOP, volume 13990 of Lecture Notes in Computer Science, page 451-478. Springer, (2023)Automating Compositional Analysis of Authentication Protocols., , , and . FMCAD, page 113-118. IEEE, (2020)Netter: Probabilistic, Stateful Network Models., , , , , and . VMCAI, volume 12597 of Lecture Notes in Computer Science, page 486-508. Springer, (2021)On Incorrectness Logic and Kleene Algebra With Top and Tests., , and . CoRR, (2021)Probabilistic Relational Reasoning via Metrics., , , and . LICS, page 1-19. IEEE, (2019)Metric Semantics for Probabilistic Relational Reasoning., , , and . CoRR, (2018)Bunched Fuzz: Sensitivity for Vector Metrics., , , and . CoRR, (2022)Learning Assumptions for Verifying Cryptographic Protocols Compositionally., , , and . FACS, volume 13077 of Lecture Notes in Computer Science, page 3-23. Springer, (2021)