Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A type system for regular expressions., , and . FTfJP@ECOOP, page 20-26. ACM, (2012)Key-dependency for a wavelet-based blind watermarking algorithm., , and . MM&Sec, page 175-179. ACM, (2004)Java UI : Effects for Controlling UI Object Access., , , and . ECOOP, volume 7920 of Lecture Notes in Computer Science, page 179-204. Springer, (2013)EnerJ: Approximate Data Types for Safe and General Low-Power Computation, , , and . Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation, page 164--174. (June 2011)Tunable Static Inference for Generic Universe Types., , and . ECOOP, volume 6813 of Lecture Notes in Computer Science, page 333-357. Springer, (2011)Verification games: making verification fun., , , , , , , and . FTfJP@ECOOP, page 42-49. ACM, (2012)Building and using pluggable type-checkers., , , , and . ICSE, page 681-690. ACM, (2011)Ensuring correct cryptographic algorithm and provider usage at compile time., , and . FTfJP@ECOOP, page 43-50. ACM, (2021)Inference and Checking of Object Ownership., , , and . ECOOP, volume 7313 of Lecture Notes in Computer Science, page 181-206. Springer, (2012)Key-dependent pyramidal wavelet domains for secure watermark embedding., , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 728-. SPIE, (2003)