Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing Flow and Context Sensitivity on the Modification-Side-Effects Problem., , , and . ISSTA, page 21-31. ACM, (1998)A concise specification language for trace monitoring., , and . SAC, page 1637-1640. ACM, (2015)A Dynamic Approach to Locating Memory Leaks., , and . ICTSS, volume 8254 of Lecture Notes in Computer Science, page 255-270. Springer, (2013)Test Templates: A Specification-Based Testing Framework., and . ICSE, page 405-414. IEEE Computer Society / ACM Press, (1993)A Tale of Two Paradigms: Formal Methods and Software Testing., and . Z User Workshop, page 51-68. Springer/BCS, (1994)A Low-Overhead, Value-Tracking Approach to Information Flow Security., , and . SEFM, volume 7504 of Lecture Notes in Computer Science, page 367-381. Springer, (2012)Modelling open distributed systems in Z., , , and . Comput. Commun., 15 (2): 103-113 (1992)Test Template Framework: A Specification-Based Testing Case Study., and . ISSTA, page 11-18. ACM, (1993)Incremental Analysis of Side Effects for C Software System., , , and . ICSE, page 422-432. ACM, (1997)Self-Replicating Expressions in the Lambda Calculus., and . ACSC, volume 26 of CRPIT, page 167-173. Australian Computer Society, (2004)