From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bit-Stealing Made Legal: Compilation for Custom Memory Representations of Algebraic Data Types., , и . Proc. ACM Program. Lang., 7 (ICFP): 813-846 (августа 2023)Static Analysis of Binary Code with Memory Indirections Using Polyhedra., , , , и . VMCAI, том 11388 из Lecture Notes in Computer Science, стр. 114-135. Springer, (2019)From Discrete Duration Calculus to Symbolic Automata., , и . SLAP@ETAPS, том 153 из Electronic Notes in Theoretical Computer Science, стр. 3-18. Elsevier, (2004)Polyhedral Dataflow Programming: A Case Study., , и . SBAC-PAD, стр. 171-179. IEEE, (2018)From Low-Level Fault Modeling (of a Pipeline Attack) to a Proven Hardening Scheme., , и . CC, стр. 174-185. ACM, (2024)Analysing Parallel Complexity of Term Rewriting., , и . LOPSTR, том 13474 из Lecture Notes in Computer Science, стр. 3-23. Springer, (2022)On Complexity Bounds and Confluence of Parallel Term Rewriting., , и . CoRR, (2023)A Survey on Parallelism and Determinism., , , и . CoRR, (2022)A Survey on Parallelism and Determinism., , , и . ACM Comput. Surv., 55 (10): 210:1-210:28 (2023)Compiling pattern matching to in-place modifications., , и . GPCE, стр. 123-129. ACM, (2021)