Author of the publication

Verifying replicated data types with typeclass refinements in Liquid Haskell.

, , , , , and . Proc. ACM Program. Lang., 4 (OOPSLA): 216:1-216:30 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deanonymizing mobility traces: using social network as a side-channel., and . CCS, page 628-637. ACM, (2012)Reducing the Branch Power Cost in Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation., , , and . Asia-Pacific Computer Systems Architecture Conference, volume 4186 of Lecture Notes in Computer Science, page 366-372. Springer, (2006)Specifying and Verifying the Correctness of Dynamic Software Updates., , , , and . VSTTE, volume 7152 of Lecture Notes in Computer Science, page 278-293. Springer, (2012)A Verified Optimizer for Quantum Circuits., , , , and . CoRR, (2019)The ruby intermediate language., , , and . DLS, page 89-98. ACM, (2009)BullFrog: Online Schema Evolution via Lazy Evaluation., , , and . SIGMOD Conference, page 194-206. ACM, (2021)Implicit Flows: Can't Live with 'Em, Can't Live without 'Em., , , and . ICISS, volume 5352 of Lecture Notes in Computer Science, page 56-70. Springer, (2008)Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study., , , , and . SOUPS @ USENIX Security Symposium, page 597-616. USENIX Association, (2021)Path projection for user-centered static analysis tools., , , and . PASTE, page 57-63. ACM, (2008)Symphony: Expressive Secure Multiparty Computation with Coordination., , , , , and . CoRR, (2023)