Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specifying and Verifying the Correctness of Dynamic Software Updates., , , , and . VSTTE, volume 7152 of Lecture Notes in Computer Science, page 278-293. Springer, (2012)Reducing the Branch Power Cost in Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation., , , and . Asia-Pacific Computer Systems Architecture Conference, volume 4186 of Lecture Notes in Computer Science, page 366-372. Springer, (2006)A Verified Optimizer for Quantum Circuits., , , , and . CoRR, (2019)Deanonymizing mobility traces: using social network as a side-channel., and . CCS, page 628-637. ACM, (2012)The ruby intermediate language., , , and . DLS, page 89-98. ACM, (2009)Implicit Flows: Can't Live with 'Em, Can't Live without 'Em., , , and . ICISS, volume 5352 of Lecture Notes in Computer Science, page 56-70. Springer, (2008)Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study., , , , and . SOUPS @ USENIX Security Symposium, page 597-616. USENIX Association, (2021)BullFrog: Online Schema Evolution via Lazy Evaluation., , , and . SIGMOD Conference, page 194-206. ACM, (2021)Coverage guided, property based testing., , and . Proc. ACM Program. Lang., 3 (OOPSLA): 181:1-181:29 (2019)Verified compilation of Quantum oracles., , , , , and . Proc. ACM Program. Lang., 6 (OOPSLA2): 589-615 (2022)