Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Morphing: Safely Shaping a Class in the Image of Others., , and . ECOOP, volume 4609 of Lecture Notes in Computer Science, page 399-424. Springer, (2007)cJ: enhancing java with safe type conditions., , and . AOSD, volume 208 of ACM International Conference Proceeding Series, page 185-198. ACM, (2007)Statically Safe Program Generation with SafeGen., , and . GPCE, volume 3676 of Lecture Notes in Computer Science, page 309-326. Springer, (2005)Statically safe program generation with SafeGen., , and . Sci. Comput. Program., 76 (5): 376-391 (2011)Typed Datalog., , and . PADL, volume 5418 of Lecture Notes in Computer Science, page 168-182. Springer, (2009)Declarative Reconfigurable Trust Management., , , , and . CIDR, www.cidrdb.org, (2009)Program generators and the tools to make them., , and . PEPM, page 92-100. ACM, (2004)Domain-specific languages and program generation with meta-AspectJ., , and . ACM Trans. Softw. Eng. Methodol., 18 (2): 6:1-6:32 (2008)Generating AspectJ Programs with Meta-AspectJ., , and . GPCE, volume 3286 of Lecture Notes in Computer Science, page 1-18. Springer, (2004)Experience report: Using tools and domain expertise to remediate architectural violations in the LogicBlox software base., , , and . ICSE Companion, page 61-70. IEEE, (2009)