Author of the publication

Verifying equivalence of database-driven applications.

, , , and . Proc. ACM Program. Lang., 2 (POPL): 56:1-56:29 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static detection of asymptotic resource side-channel vulnerabilities in web applications., , , and . ASE, page 229-239. IEEE Computer Society, (2017)Static Detection of DoS Vulnerabilities in Programs that use Regular Expressions (Extended Version)., , , and . CoRR, (2017)Component-based Synthesis of Table Consolidation and Transformation Tasks from Examples., , , , and . CoRR, (2016)Component-based synthesis of table consolidation and transformation tasks from examples., , , , and . PLDI, page 422-436. ACM, (2017)Automated Inference of Library Specifications for Source-Sink Property Verification., , and . APLAS, volume 8301 of Lecture Notes in Computer Science, page 290-306. Springer, (2013)EXPLORER : query- and demand-driven exploration of interprocedural control flow properties., , , and . OOPSLA, page 520-534. ACM, (2015)Visualization by Example., , , , and . CoRR, (2019)Formal Verification of Workflow Policies for Smart Contracts in Azure Blockchain., , , , , , , and . VSTTE, volume 12031 of Lecture Notes in Computer Science, page 87-106. Springer, (2019)Trinity: An Extensible Synthesis Framework for Data Science., , , , and . Proc. VLDB Endow., 12 (12): 1914-1917 (2019)LambdaNet: Probabilistic Type Inference using Graph Neural Networks., , , and . ICLR, OpenReview.net, (2020)