Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing transitive to non-transitive object immutability., , , , and . PLATEAU@SPLASH, page 47-48. ACM, (2015)The Caernarvon secure embedded operating system., , , , and . ACM SIGOPS Oper. Syst. Rev., 42 (1): 32-39 (2008)Business Users and Program Variability: Bridging the Gap., , , , and . ICSR, volume 3107 of Lecture Notes in Computer Science, page 11-22. Springer, (2004)The case for analysis preserving language transformation., , , , , , and . ISSTA, page 191-202. ACM, (2006)Verifying the EROS Confinement Mechanism., and . S&P, page 166-176. IEEE Computer Society, (2000)Software Development Practices, Barriers in the Field and the Relationship to Software Quality., , , , , , , , , and . ESEM, page 16:1-16:6. ACM, (2016)Panel: Empirically-based Secure OS Design., , , and . NSPW, page 90-93. ACM, (2017)Comparing Urban and Rural Telecenters Costs., , , and . Electron. J. Inf. Syst. Dev. Ctries., 4 (1): 1-13 (2001)Process Algebras and Meta-algebras: Theory and Practice.. Cornell University, USA, (1995)Compiling Joy Into Silicon: An Exercise in Applied Structural Operational Semantics., , and . REX Workshop, volume 666 of Lecture Notes in Computer Science, page 639-659. Springer, (1992)