From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Structure of Authority: Why Security Is Not a Separable Concern., , и . MOZ, том 3389 из Lecture Notes in Computer Science, стр. 2-20. Springer, (2004)Concurrency Among Strangers: Programming in E as Plan Coordination, , и . Symposium on Trustworthy Global Computing, том 3705 из Lecture Notes in Computer Science, стр. 195--229. Springer, (апреля 2005)Logical Secrets., , , и . ICLP, стр. 704-728. MIT Press, (1987)Proxies: design principles for robust object-oriented intercession APIs., и . DLS, стр. 59-72. ACM, (2010)Channels: A Generalization of Streams., , , , , и . ICLP, стр. 839-857. MIT Press, (1987)Uncanny Valleys in Declarative Language Design., , , и . SNAPL, том 71 из LIPIcs, стр. 9:1-9:12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Distributed Electronic Rights in JavaScript., , и . ESOP, том 7792 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2013)Definition Groups: Making Sources into First-Class Objects., , и . Research Directions in Object-Oriented Programming, MIT Press, (1987)Capability-Based Financial Instruments., , и . Financial Cryptography, том 1962 из Lecture Notes in Computer Science, стр. 349-378. Springer, (2000)Paradigm Regained: Abstraction Mechanisms for Access Control., и . ASIAN, том 2896 из Lecture Notes in Computer Science, стр. 224-242. Springer, (2003)