Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sound Gradual Verification with Symbolic Execution., , and . CoRR, (2023)Plan B: Design Methodology for Cyber-Physical Systems Robust to Timing Failures., , , , , , , , , and 1 other author(s). ACM Trans. Cyber Phys. Syst., 6 (3): 21:1-21:39 (2022)Discovering Architectures from Running Systems, , , , and . Transactions on Software Engineering, 32 (7): 454--466 (2006)Tool support for statically checking the structural conformance of an object-oriented system to its runtime architecture., and . OOPSLA Companion, page 741-742. ACM, (2008)Young guns/object orientation: the next generation., , , , , , , , , and 1 other author(s). OOPSLA Companion, page 940-942. ACM, (2006)Checking framework plugins., and . OOPSLA Companion, page 795-796. ACM, (2007)Verifying correct usage of atomic blocks and typestate., , and . OOPSLA, page 227-244. ACM, (2008)A Capability-Based Module System for Authority Control (Artifact)., , , and . Dagstuhl Artifacts Ser., 3 (2): 02:1-02:2 (2017)Modules in wyvern: advanced control over security and privacy., , and . HotSoS, page 68. ACM, (2016)Structuring Documentation to Support State Search: A Laboratory Experiment about Protocol Programming., , and . ECOOP, volume 8586 of Lecture Notes in Computer Science, page 157-181. Springer, (2014)