Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Flow Analysis of Program Fragments., , and . ESEC / SIGSOFT FSE, volume 1687 of Lecture Notes in Computer Science, page 235-252. Springer, (1999)An Extended Form of Must Alias Analysis for Dynamic Allocation., and . POPL, page 74-84. ACM Press, (1995)Experiments with Combined Analysis for Pointer Aliasing., , and . PASTE, page 11-18. ACM, (1998)Interprocedural Def-Use Associations in C Programs., and . Symposium on Testing, Analysis, and Verification, page 139-153. ACM, (1991)Complexity of Concrete Type-Inference in the Presence of Exceptions., , and . ESOP, volume 1381 of Lecture Notes in Computer Science, page 57-74. Springer, (1998)Interprocedural Side Effect Analysis With Pointer Aliasing., , and . PLDI, page 56-67. ACM, (1993)Secure De-identification and Re-identification., and . AMIA, AMIA, (2003)A Safe Approximate Algorithm for Interprocedural Pointer Aliasing., and . PLDI, page 235-248. ACM, (1992)Comparing Flow and Context Sensitivity on the Modification-Side-Effects Problem., , , and . ISSTA, page 21-31. ACM, (1998)A safe approximate algorithm for interprocedural pointer aliasing (with retrospective), and . Best of PLDI, page 473-489. ACM, (1992)