Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.


Other publications of authors with the same name

Multi-Stage Programming with Explicit Annotations., and . PEPM, page 203-217. ACM, (1997)Language-based verification will change the world., , and . FoSER, page 343-348. ACM, (2010)A hierarchy of mendler style recursion combinators: taming inductive datatypes with negative occurrences., and . ICFP, page 234-246. ACM, (2011)Binders unbound., , and . ICFP, page 333-345. ACM, (2011)Multi-Stage Programming., and . ICFP, page 321. ACM, (1997)SIGPLAN Notices 32(8), August 1997.Closed types for a safe imperative MetaML., , and . J. Funct. Program., 13 (3): 545-571 (2003)Multi-Stage Programming: Axiomatization and Type Safety., , and . ICALP, volume 1443 of Lecture Notes in Computer Science, page 918-929. Springer, (1998)Generic Programming in Ωmega.. SSDGP, volume 4719 of Lecture Notes in Computer Science, page 258-284. Springer, (2006)Fine Control of Demand in Haskell., , and . MPC, volume 2386 of Lecture Notes in Computer Science, page 68-93. Springer, (2002)Uniform Traversal Combinators: Definition, Use and Properties., , and . CADE, volume 607 of Lecture Notes in Computer Science, page 148-162. Springer, (1992)