Author of the publication

Detection of information leak by data flow analysis.

, and . ACM SIGPLAN Notices, 37 (8): 66-71 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative trust management with QoS-aware service selection., , and . IJWGS, 11 (3): 247-264 (2015)Tree-Pattern-Based Clone Detection with High Precision and Recall., , and . KSII Trans. Internet Inf. Syst., 12 (5): 1932-1950 (2018)An Action Semantics Based on Two Combinators., and . Semantics and Algebraic Specification, volume 5700 of Lecture Notes in Computer Science, page 274-296. Springer, (2009)Action Transformation by Partial Evaluation.. PEPM, page 230-240. ACM Press, (1995)A Practical String Analyzer by the Widening Approach., , , and . APLAS, volume 4279 of Lecture Notes in Computer Science, page 374-388. Springer, (2006)A Knowledge-Based Information Extraction System for Semi-structured Labeled Documents., , , and . IDEAL, volume 2412 of Lecture Notes in Computer Science, page 105-110. Springer, (2002)A Policy Description Language for Context-Based Access Control and Adaptation in Ubiquitous Environment., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 650-659. Springer, (2006)An Approach to Modeling Context-Adaptable Services., and . KES (3), volume 4694 of Lecture Notes in Computer Science, page 626-633. Springer, (2007)Action Semantics-Directed Prototyping., and . Comput. Lang., 19 (4): 213-233 (1993)Abstract LR-Parsing., , and . Formal Modeling: Actors, Open Systems, Biological Systems, volume 7000 of Lecture Notes in Computer Science, page 90-109. Springer, (2011)