Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering Architectures from Running Systems, , , , and . Transactions on Software Engineering, 32 (7): 454--466 (2006)Modules in wyvern: advanced control over security and privacy., , and . HotSoS, page 68. ACM, (2016)Cooperative Exceptions for Concurrent Objects., , , and . PRDC, page 21-31. IEEE Computer Society, (2015)Statically checking API protocol conformance with mined multi-object specifications., , , and . ICSE, page 925-935. IEEE Computer Society, (2012)Glacier: transitive class immutability for Java., , , , and . ICSE, page 496-506. IEEE / ACM, (2017)Assuring Object-Oriented Architecture.. ECOOP, volume 4609 of Lecture Notes in Computer Science, page 450. Springer, (2007)Structuring Documentation to Support State Search: A Laboratory Experiment about Protocol Programming., , and . ECOOP, volume 8586 of Lecture Notes in Computer Science, page 157-181. Springer, (2014)A Capability-Based Module System for Authority Control., , , and . ECOOP, volume 74 of LIPIcs, page 20:1-20:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Sound Gradual Verification with Symbolic Execution., , and . CoRR, (2023)A Capability-Based Module System for Authority Control (Artifact)., , , and . Dagstuhl Artifacts Ser., 3 (2): 02:1-02:2 (2017)