Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architectural Styles as Adaptors., , and . WICSA, volume 140 of IFIP Conference Proceedings, page 203-224. Kluwer, (1999)Statically Safe Program Generation with SafeGen., , and . GPCE, volume 3676 of Lecture Notes in Computer Science, page 309-326. Springer, (2005)Scoping Constructs for Software Generators., and . GCSE, volume 1799 of Lecture Notes in Computer Science, page 65-78. Springer, (1999)Invited talk: program generators and the tools to make them.. PPDP, page 7-8. ACM, (2004)A Personal Outlook on Generator Research (A Position Paper).. Domain-Specific Program Generation, volume 3016 of Lecture Notes in Computer Science, page 92-106. Springer, (2003)Gigahorse: thorough, declarative decompilation of smart contracts., , , and . ICSE, page 1176-1186. IEEE / ACM, (2019)General and efficient locking without blocking., , , and . MSPC, page 1-5. ACM, (2008)Ethainter: a smart contract security analyzer for composite vulnerabilities., , , , and . PLDI, page 454-469. ACM, (2020)DiSTiL: A Transformation Library for Data Structures., and . DSL, USENIX, (1997)JTS: tools for implementing domain-specific languages., , and . ICSR, page 143-153. IEEE Computer Society, (1998)