Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated techniques for provably safe mobile code., , , , and . Theor. Comput. Sci., 290 (2): 1175-1199 (2003)Manifest Deadlock-Freedom for Shared Session Types., , and . ESOP, volume 11423 of Lecture Notes in Computer Science, page 611-639. Springer, (2019)Linear logical approximations., and . PEPM, page 9-20. ACM, (2009)Editorial., , and . ACM Trans. Comput. Log., 3 (3): 335-335 (2002)Contextual modal type theory., , and . ACM Trans. Comput. Log., 9 (3): 23:1-23:49 (2008)Proof theory and its role in programming language research.. PLMW@POPL, page 4:1. ACM, (2015)Monadic concurrent linear logic programming., , , and . PPDP, page 35-46. ACM, (2005)Type-Directed Concurrency., and . CONCUR, volume 3653 of Lecture Notes in Computer Science, page 6-20. Springer, (2005)Session Types as Intuitionistic Linear Propositions., and . CONCUR, volume 6269 of Lecture Notes in Computer Science, page 222-236. Springer, (2010)The Practice of Logical Frameworks.. CAAP, volume 1059 of Lecture Notes in Computer Science, page 119-134. Springer, (1996)