Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Type System for the Push-Enter Model., and . APLAS, page 13-27. (2001)Detecting Java Theft Based on Static API Trace Birthmark., , , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 121-135. Springer, (2008)Automatic Generation of Hardware/Software Interface with Product-Specific Debugging Tools., , , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 742-753. Springer, (2006)A Path Sensitive Type System for Resource Usage Verification of C Like Languages., , , and . APLAS, volume 3780 of Lecture Notes in Computer Science, page 264-280. Springer, (2005)A tiny hypervisor-based trusted geolocation framework with minimized TPM operations., , , , and . J. Syst. Softw., (2016)Identifying Input-Dependent Jumps from Obfuscated Execution using Dynamic Data Flow Graphs., and . SSPREW@ACSAC, page 3:1-3:12. ACM, (2018)Refining schizophrenia via graph reachability in Esterel., , , , and . MEMOCODE, page 18-27. IEEE, (2009)Over-Approximated Control Flow Graph Construction on Pure Esterel., , , , and . IEICE Trans. Inf. Syst., 93-D (5): 985-993 (2010)Detecting Common Modules in Java Packages Based on Static Object Trace Birthmark., , , and . Comput. J., 54 (1): 108-124 (2011)Automatic Hardware/Software Interface Generation for Embedded System., , , and . J. Inf. Process. Syst., 2 (3): 137-142 (2006)