Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint Systems for Useless Variable Elimination., and . POPL, page 291-302. ACM, (1999)BEAST 2.5: An advanced software platform for Bayesian evolutionary analysis., , , , , , , , , and 15 other author(s). PLoS Comput. Biol., (2019)Bayesian phylodynamic inference with complex models., and . PLoS Comput. Biol., (2018)Towards Verification of Well-Formed Transactions in Java Card Bytecode., and . Bytecode@ETAPS, volume 141 of Electronic Notes in Theoretical Computer Science, page 145-162. Elsevier, (2005)Tempus fugit: How to plug it., , , and . J. Log. Algebraic Methods Program., 72 (2): 173-190 (2007)Operational semantics of the Java Card Virtual Machine.. J. Log. Algebraic Methods Program., 58 (1-2): 3-25 (2004)Filling Out the Gaps: A Padding Algorithm for Transforming Out Timing Leaks.. QAPL, volume 153 of Electronic Notes in Theoretical Computer Science, page 241-257. Elsevier, (2005)