Author of the publication

Scala implicits are everywhere: a large-scale study of the use of Scala implicits in the wild.

, , and . Proc. ACM Program. Lang., 3 (OOPSLA): 163:1-163:28 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Crediting Protocol for Hybrid Cellular and Ad-Hoc Networks., , , and . ICETE (3), page 142-149. INSTICC Press, (2004)Repeatability, reproducibility and rigor in CS research.. PLMW@POPL, page 12:1. ACM, (2015)Incommunicado: efficient communication for isolates., , , and . OOPSLA, page 262-274. ACM, (2002)SIGPLAN Notices 37(11).Eval begone!: semi-automated removal of eval from javascript programs., , , and . OOPSLA, page 607-620. ACM, (2012)Encapsulating Objects with Confined Types., , and . OOPSLA, page 241-253. ACM, (2001)SIGPLAN Notices 36(11).Efficient Type Inclusion Tests., , and . OOPSLA, page 142-157. ACM, (1997)SIGPLAN Notices 32(10).M3: high-performance memory management from off-the-shelf components., , and . ISMM, page 3-13. ACM, (2014)Software hardening: a research agenda., , , , and . STOP@ECOOP, page 58-70. ACM, (2009)Cooking the Books: Formalizing JMM Implementation Recipes., , and . ECOOP, volume 37 of LIPIcs, page 445-469. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Resource Management for Safe Languages., and . ECOOP Workshops, volume 2548 of Lecture Notes in Computer Science, page 1-14. Springer, (2002)