From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Objects in the pi-Calculus. Inf. Comput., 116 (2): 253-271 (февраля 1995)Typed Memory Management.. Cornell University, USA, (2000)A "Low-Tech" Design Experiment Improving Student Work.. ICCE, стр. 849-850. IEEE Computer Society, (2002)07695-1509-6.Towards a Quality Model for Grid Portals., , , и . ICSOFT (Selected Papers), том 10 из Communications in Computer and Information Science, стр. 195-203. Springer, (2006)A Case-Based Assessment of the Descriptiveness of Three CIO Typologies and Validity of Two CIO-Effectiveness Models., , , и . ACIS, (2008)Synthesizing bijective lenses., , , , и . Proc. ACM Program. Lang., 2 (POPL): 1:1-1:30 (2018)Run-Time Enforcement of Nonsafety Policies., , и . ACM Trans. Inf. Syst. Secur., 12 (3): 19:1-19:41 (2009)Stack-based typed assembly language., , , и . J. Funct. Program., 12 (1): 3-88 (2002)Typed memory management via static capabilities., , и . ACM Trans. Program. Lang. Syst., 22 (4): 701-771 (2000)NV: An intermediate language for network verification., , , и . NetPL@SIGCOMM, стр. 3-4. ACM, (2019)