Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inserting Safe Memory Re-use Commands into ML-like Programs., , and . APLAS, page 317-333. (2002)Spreadsheet Probabilistic Programming., , , and . CoRR, (2016)Automatically generating features for learning program analysis heuristics for C-like languages., , , and . Proc. ACM Program. Lang., 1 (OOPSLA): 101:1-101:25 (2017)Finding optimum abstractions in parametric dataflow analysis., , and . PLDI, page 365-376. ACM, (2013)Symbolic automata for representing big code., , , and . Acta Inf., 53 (4): 327-356 (2016)Show No Weakness: Sequentially Consistent Specifications of TSO Libraries., , and . DISC, volume 7611 of Lecture Notes in Computer Science, page 31-45. Springer, (2012)On the Semantics of Refinement Calculi., and . FoSSaCS, volume 1784 of Lecture Notes in Computer Science, page 359-374. Springer, (2000)Linearizability with Ownership Transfer., and . CONCUR, volume 7454 of Lecture Notes in Computer Science, page 256-271. Springer, (2012)Shape Analysis for Low-Level Code.. SAS, volume 4134 of Lecture Notes in Computer Science, page 280. Springer, (2006)LF-PPL: A Low-Level First Order Probabilistic Programming Language for Non-Differentiable Models., , , , , and . AISTATS, volume 89 of Proceedings of Machine Learning Research, page 148-157. PMLR, (2019)