Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proving Safety of Speculative Load Instructions at Compile Time., , and . ESOP, volume 582 of Lecture Notes in Computer Science, page 56-72. Springer, (1992)A Sparse Table Implementation of Priority Queues., , and . ICALP, volume 115 of Lecture Notes in Computer Science, page 417-431. Springer, (1981)Covering a Graph by Circuits., and . ICALP, volume 62 of Lecture Notes in Computer Science, page 289-299. Springer, (1978)FLAME - An Efficient Access Method for Optical Disks., , , and . RIAO, page 227-236. CID, (1988)Cleanness Checking of String Manipulations in C Programs via Integer Analysis., , and . SAS, volume 2126 of Lecture Notes in Computer Science, page 194-212. Springer, (2001)Checking Cleanness in Linked Lists., , and . SAS, volume 1824 of Lecture Notes in Computer Science, page 115-134. Springer, (2000)Some Matching Problems., and . ICALP, volume 52 of Lecture Notes in Computer Science, page 258-268. Springer, (1977)CSSV: towards a realistic tool for statically detecting all buffer overflows in C., , and . PLDI, page 155-167. ACM, (2003)Global Instruction Scheduling for Superscalar Machines., and . PLDI, page 241-255. ACM, (1991)Designing efficient algorithms for APL: A case study of a hydraulic-network solver., and . APL, page 19-23. ACM, (1979)