Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolving Spatially Aggregated Features from Satellite Imagery for Regional Modeling., , , and . CoRR, (2017)Types and trace effects for object orientation.. High. Order Symb. Comput., 21 (3): 239-282 (2008)Type-specialized staged programming with process separation., , and . WGP@ICFP, page 49-60. ACM, (2009)Maybe tainted data: Theory and a case study., , and . J. Comput. Secur., 28 (3): 295-335 (2020)Snowcloud: A Complete Data Gathering System for Snow Hydrology Research., and . REALWSN, volume 281 of Lecture Notes in Electrical Engineering, page 3-14. Springer, (2013)A systematic approach to static access control., , and . ACM Trans. Program. Lang. Syst., 27 (2): 344-382 (2005)History Effects and Verification., and . APLAS, volume 3302 of Lecture Notes in Computer Science, page 107-128. Springer, (2004)Self-Identifying Data for Fair Use., , and . ACM J. Data Inf. Qual., 5 (3): 11:1-11:30 (2015)Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors., , , , , and . USENIX Security Symposium, page 1379-1395. USENIX Association, (2022)Static enforcement of security with types., and . ICFP, page 34-45. ACM, (2000)SIGPLAN Notices 35(9), September 2000.