Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modules in wyvern: advanced control over security and privacy., , and . HotSoS, page 68. ACM, (2016)Discovering Architectures from Running Systems, , , , and . Transactions on Software Engineering, 32 (7): 454--466 (2006)Sound Gradual Verification with Symbolic Execution., , and . CoRR, (2023)Plan B: Design Methodology for Cyber-Physical Systems Robust to Timing Failures., , , , , , , , , and 1 other author(s). ACM Trans. Cyber Phys. Syst., 6 (3): 21:1-21:39 (2022)A Capability-Based Module System for Authority Control (Artifact)., , , and . Dagstuhl Artifacts Ser., 3 (2): 02:1-02:2 (2017)Checking framework plugins., and . OOPSLA Companion, page 795-796. ACM, (2007)Young guns/object orientation: the next generation., , , , , , , , , and 1 other author(s). OOPSLA Companion, page 940-942. ACM, (2006)Tool support for statically checking the structural conformance of an object-oriented system to its runtime architecture., and . OOPSLA Companion, page 741-742. ACM, (2008)Verifying correct usage of atomic blocks and typestate., , and . OOPSLA, page 227-244. ACM, (2008)A Pilot Study of the Safety and Usability of the Obsidian Blockchain Programming Language., , , , , and . PLATEAU@UIST, volume 76 of OASIcs, page 2:1-2:11. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)