Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design Dimensions for Software Certification: A Grounded Analysis., , , , and . CoRR, (2019)Crying Wolf: An Empirical Study of SSL Warning Effectiveness., , , , and . USENIX Security Symposium, page 399-416. USENIX Association, (2009)A Pilot Study of the Safety and Usability of the Obsidian Blockchain Programming Language., , , , , and . PLATEAU@UIST, volume 76 of OASIcs, page 2:1-2:11. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Glacier: transitive class immutability for Java., , , , and . ICSE, page 496-506. IEEE / ACM, (2017)Structuring Documentation to Support State Search: A Laboratory Experiment about Protocol Programming., , and . ECOOP, volume 8586 of Lecture Notes in Computer Science, page 157-181. Springer, (2014)Interdisciplinary programming language design., , , and . Onward!, page 133-146. ACM, (2018)A theory of typestate-oriented programming., , and . FTfJP@ECOOP, page 9:1-9:7. ACM, (2010)Searching the state space: a qualitative study of API protocol usability., , and . ICPC, page 82-93. IEEE Computer Society, (2015)Rose: Efficient and Extensible Autodiff on the Web., , , and . CoRR, (2024)PL and HCI: better together., , and . Commun. ACM, 64 (8): 98-106 (2021)