Author of the publication

Program Synthesis Using Dual Interpretation.

, , and . CADE, volume 9195 of Lecture Notes in Computer Science, page 482-497. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Theory through Videos - A Teaching Experience in a Theoretical Course based on Self-learning Videos and Problem-solving Sessions., , , and . CSEDU (2), page 93-98. SciTePress, (2011)Composition and Substitution in Provenance and Workflows., , and . TaPP, USENIX Association, (2016)Analytics without Tears or Is There a Way for Data to Be Anonymized and Yet Still Useful?, and . IEEE Internet Comput., 22 (3): 58-64 (2018)Private Protocols for U-Statistics in the Local Model and Beyond., , , and . AISTATS, volume 108 of Proceedings of Machine Learning Research, page 1573-1583. PMLR, (2020)Towards Sparse Federated Analytics: Location Heatmaps under Distributed Differential Privacy with Secure Aggregation., , , , , , and . Proc. Priv. Enhancing Technol., 2022 (4): 162-182 (2022)A Synthesized Algorithm for Interactive Consistency., and . NASA Formal Methods, volume 8430 of Lecture Notes in Computer Science, page 270-284. Springer, (2014)Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL., , and . IACR Cryptology ePrint Archive, (2019)The HOM Problem is EXPTIME-Complete., , , and . LICS, page 255-264. IEEE Computer Society, (2012)Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation., , , , , , and . IEEE Symposium on Security and Privacy, page 218-234. IEEE Computer Society, (2016)First-Order Unification on Compressed Terms., , and . RTA, volume 10 of LIPIcs, page 51-60. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2011)