From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Finding protocol manipulation attacks., , , , и . SIGCOMM, стр. 26-37. ACM, (2011)Finding Network Misconfigurations by Automatic Template Inference., , , , , , и . NSDI, стр. 999-1013. USENIX Association, (2020)Declarative mocking., , , и . ISSTA, стр. 246-256. ACM, (2013)Tasks: language support for event-driven programming., , и . PEPM, стр. 134-143. ACM, (2007)Packrat parsers can support left recursion., , и . PEPM, стр. 103-110. ACM, (2008)Fine-Grained Access Control with Object-Sensitive Roles., , , и . ECOOP, том 5653 из Lecture Notes in Computer Science, стр. 173-194. Springer, (2009)An Extensible State Machine Pattern for Interactive Applications., и . ECOOP, том 5142 из Lecture Notes in Computer Science, стр. 566-591. Springer, (2008)Practical predicate dispatch.. OOPSLA, стр. 345-364. ACM, (2004)A framework for implementing pluggable type systems., , , и . OOPSLA, стр. 57-74. ACM, (2006)Towards concurrency refactoring for x10., , и . PPoPP, стр. 303-304. ACM, (2009)