Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stratified Abstraction of Access Control Policies., , , , , , , , , and 8 other author(s). CAV (1), volume 12224 of Lecture Notes in Computer Science, page 165-176. Springer, (2020)Abstractions for network update., , , , and . SIGCOMM, page 323-334. ACM, (2012)Tutorial: Practical verification of network programs., , , and . FMCAD, page 9-10. IEEE, (2013)Block public access: trust safety verification of access control policies., , , , , , , , , and 4 other author(s). ESEC/SIGSOFT FSE, page 281-291. ACM, (2020)One-Click Formal Methods., , , , , , , , , and 1 other author(s). IEEE Softw., 36 (6): 61-65 (2019)I¿¿¿: a calculus for internet of things automation., , , , and . Onward!, page 119-133. ACM, (2017)P4: programming protocol-independent packet processors., , , , , , , , , and 1 other author(s). Comput. Commun. Rev., 44 (3): 87-95 (2014)Splendid isolation: a slice abstraction for software-defined networks., , , and . HotSDN@SIGCOMM, page 79-84. ACM, (2012)A practical framework for type inference error explanation., , , and . OOPSLA, page 781-799. ACM, (2016)Type-directed program synthesis for RESTful APIs., , , , , and . PLDI, page 122-136. ACM, (2022)