Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying dynamic race detection., , , and . CPP, page 151-163. ACM, (2017)Preserving Secrecy Under Refinement., , and . ICALP (2), volume 4052 of Lecture Notes in Computer Science, page 107-118. Springer, (2006)Computation focusing., and . Proc. ACM Program. Lang., 4 (ICFP): 95:1-95:27 (2020)Choice Trees: Representing Nondeterministic, Recursive, and Impure Programs in Coq., , , , and . Proc. ACM Program. Lang., 7 (POPL): 1770-1800 (January 2023)Hardware-Enforced Comprehensive Memory Safety., , and . IEEE Micro, 33 (3): 38-47 (2013)Generative type abstraction and type-level computation., , , and . POPL, page 227-240. ACM, (2011)A Design for a Security-Typed Language with Certificate-Based Declassification., and . ESOP, volume 3444 of Lecture Notes in Computer Science, page 279-294. Springer, (2005)Principals in Programming Languages: A Syntactic Proof Technique., , and . ICFP, page 197-207. ACM, (1999)SIGPLAN Notices 34(9), September 1999.Type-and-example-directed program synthesis., and . PLDI, page 619-630. ACM, (2015)Strong and Weak Policy Relations., , , and . POLICY, page 33-36. IEEE Computer Society, (2009)