Author of the publication

Safe, Untrusted Agents Using Proof-Carrying Code.

, and . Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, page 61-91. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Accuracy of Digital Phase Sensitive Detectors Implemented in FPGA Technology., , and . IEEE Trans. Instrumentation and Measurement, 63 (8): 1926-1936 (2014)Analysis of Time and Frequency Domain Performance of MFIR Filters., , and . ESA, page 323-329. CSREA Press, (2008)Cache Behavior of Combinator Graph Reduction., , and . ACM Trans. Program. Lang. Syst., 14 (2): 265-297 (1992)An Implementation of Parametrized Partial Evaluation., and . JTASPEFT/WSA, volume 74 of Series Bigre, page 82-89. Atelier Irisa, IRISA, Campus de Beaulieu, (1991)A Realistic Compiler Generator Based on High-Level Semantics., and . POPL, page 284-295. ACM Press, (1987)Model-Driven Construction of Certified Binaries., , , , and . MoDELS, volume 4735 of Lecture Notes in Computer Science, page 666-681. Springer, (2007)An FPFA Based Object Recognition Machine., , and . FPL, volume 1482 of Lecture Notes in Computer Science, page 228-237. Springer, (1998)An FPGA Prototype for a Multiplierless FIR Filter Built Using the Logarithmic Number System.. FPL, volume 975 of Lecture Notes in Computer Science, page 303-310. Springer, (1995)What Are We Trying to Prove? Reflections on Experiences with Proof-Carrying Code.. TACAS, volume 2619 of Lecture Notes in Computer Science, page 1. Springer, (2003)No Assembly Required: Compiling Standard ML to C., , and . LOPLAS, 1 (2): 161-177 (1992)