Author of the publication

Litmus: Running Tests against Hardware.

, , , and . TACAS, volume 6605 of Lecture Notes in Computer Science, page 41-44. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rigour is good for you and feasible: reflections on formal treatments of C and UDP sockets., , and . ACM SIGOPS European Workshop, page 49-53. ACM, (2002)Global/Local Subtyping and Capability Inference for a Distributed pi-calculus.. ICALP, volume 1443 of Lecture Notes in Computer Science, page 695-706. Springer, (1998)A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service., , and . FM, volume 5014 of Lecture Notes in Computer Science, page 294-309. Springer, (2008)False Concurrency and Strange-but-True Machines - (Abstract).. CONCUR, volume 7454 of Lecture Notes in Computer Science, page 37-38. Springer, (2012)Through computer architecture, darkly., , , , and . Commun. ACM, 62 (6): 25-27 (2019)Timing UDP: Mechanized Semantics for Sockets, Threads, and Failures., , , and . ESOP, volume 2305 of Lecture Notes in Computer Science, page 278-294. Springer, (2002)ISA semantics for ARMv8-a, RISC-v, and CHERI-MIPS., , , , , , , , , and 4 other author(s). Proc. ACM Program. Lang., 3 (POPL): 71:1-71:31 (2019)Nomadic pict: Programming languages, communication infrastructure overlays, and semantics for mobile computation., , and . ACM Trans. Program. Lang. Syst., 32 (4): 12:1-12:63 (2010)Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL., , , , and . ICNP, page 117-126. IEEE Computer Society, (2006)Secure Composition of Insecure Components., and . CSFW, page 136-150. IEEE Computer Society, (1999)