Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abstraction-Carrying Code: a Model for Mobile Code Safety., , and . New Generation Comput., 26 (2): 171-204 (2008)Some Issues on Incremental Abstraction-Carrying Code, , and . CoRR, (2007)Abstract Interpretation-Based Mobile Code Certification., , and . ICLP, volume 3132 of Lecture Notes in Computer Science, page 446-447. Springer, (2004)Verification of Java Bytecode Using Analysis and Transformation of Logic Programs., , , and . PADL, volume 4354 of Lecture Notes in Computer Science, page 124-139. Springer, (2007)A Formal, Resource Consumption-Preserving Translation of Actors to Haskell., , , and . LOPSTR, volume 10184 of Lecture Notes in Computer Science, page 21-37. Springer, (2016)EthIR: A Framework for High-Level Analysis of Ethereum Bytecode., , , , and . ATVA, volume 11138 of Lecture Notes in Computer Science, page 513-520. Springer, (2018)Efficient local unfolding with ancestor stacks., , and . Theory Pract. Log. Program., 11 (1): 1-32 (2011)Analyzing Smart Contracts: From EVM to a sound Control-Flow Graph., , , , and . CoRR, (2020)Incremental resource usage analysis., , , and . PEPM, page 25-34. ACM, (2012)Symbolic Profiling for Multi-paradigm Declarative Languages., and . LOPSTR, volume 2372 of Lecture Notes in Computer Science, page 148-167. Springer, (2001)