Author of the publication

A Semantic Approach to Secure Information Flow.

, and . MPC, volume 1422 of Lecture Notes in Computer Science, page 254-271. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

nfer - A Notation and System for Inferring Event Stream Abstractions., , and . RV, volume 10012 of Lecture Notes in Computer Science, page 235-250. Springer, (2016)On Feasibility of Decision Trees for Edge Intelligence in Highly Constrained Internet-of-Things (IoT)., , and . ACM Great Lakes Symposium on VLSI, page 217-218. ACM, (2023)Range Based Hardware Optimization of Multilayer Perceptrons with RELUs., , and . iSES, page 421-426. IEEE, (2022)Verifying Multi-threaded C Programs with SPIN., and . SPIN, volume 5156 of Lecture Notes in Computer Science, page 325-342. Springer, (2008)Simulated Annealing Based Area Optimization of Multilayer Perceptron Hardware for IoT Edge Devices., , and . IFIPIoT (1), volume 683 of IFIP Advances in Information and Communication Technology, page 34-47. Springer, (2023)Automated Testing of Planning Models., , , , and . MoChArt, volume 5348 of Lecture Notes in Computer Science, page 90-105. Springer, (2008)Modeling with Scala., and . ISoLA (1), volume 11244 of Lecture Notes in Computer Science, page 184-205. Springer, (2018)New Challenges in Model Checking., , and . 25 Years of Model Checking, volume 5000 of Lecture Notes in Computer Science, page 65-76. Springer, (2008)Using Lightweight Formal Methods to Validate a Key-Value Storage Node in Amazon S3., , , , , , , , , and 2 other author(s). SOSP, page 836-850. ACM, (2021)Denali: A Goal-directed Superoptimizer., , and . PLDI, page 304-314. ACM, (2002)