Author of the publication

Proving the Correctness of Unfold/Fold Program Transformations Using Bisimulation.

, and . Ershov Memorial Conference, volume 7162 of Lecture Notes in Computer Science, page 153-169. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Taxonomy for Triggered Interactions Using Fair Object Semantics., , and . FIW, page 193-209. IOS Press, (2000)Usage Counting Analysis for Lazy Functional Languages.. Inf. Comput., 146 (2): 100-137 (1998)Higher Order Deforestation.. Fundam. Informaticae, 69 (1-2): 39-61 (2006)Compile-Time Garbage Collection for Lazy Functional Languages. IWMM, volume 986 of Lecture Notes in Computer Science, page 119-144. Springer, (1995)Generating Loop Invariants for Program Verification by Transformation.. VPT@ETAPS, volume 253 of EPTCS, page 36-53. (2017)Proving the Correctness of Unfold/Fold Program Transformations Using Bisimulation., and . Ershov Memorial Conference, volume 7162 of Lecture Notes in Computer Science, page 153-169. Springer, (2011)Detecting Man-in-the-Middle Attacks by Precise Timing., and . SECURWARE, page 81-86. IEEE Computer Society, (2009)Program Transformation to Identify Parallel Skeletons., and . PDP, page 486-494. IEEE Computer Society, (2016)Distillation: extracting the essence of programs.. PEPM, page 61-70. ACM, (2007)Sharing Analysis of Lazy First-Order Functional Programs.. WSA, volume 81-82 of Series Bigre, page 68-78. Atelier Irisa, IRISA, Campus de Beaulieu, (1992)