From post

Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions.

, и . ESOP, том 6012 из Lecture Notes in Computer Science, стр. 2-22. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Are there any reliable leading indicators for US inflation and GDP growth?, и . International Journal of Forecasting, 22 (1): 137--151 (00 2006)Design and Correctness of Program Transformations Based on Control-Flow Analysis., , и . TACS, том 2215 из Lecture Notes in Computer Science, стр. 420-447. Springer, (2001)Information Flow Analysis in Logical Form., и . SAS, том 3148 из Lecture Notes in Computer Science, стр. 100-115. Springer, (2004)Subjective Simulation as a Notion of Morphism for Composing Concurrent Resources., , и . CoRR, (2017)Automata-Based Confidentiality Monitoring., , , и . ASIAN, том 4435 из Lecture Notes in Computer Science, стр. 75-89. Springer, (2006)Programming Paradigm Driven Heap Analysis., , и . CC, том 7210 из Lecture Notes in Computer Science, стр. 41-60. Springer, (2012)Stackability in the Simply-Typed Call-by-Value Lambda Calculus., и . SAS, том 864 из Lecture Notes in Computer Science, стр. 131-146. Springer, (1994)Using Access Control for Secure Information Flow in a Java-like Language., и . CSFW, стр. 155-169. IEEE Computer Society, (2003)Regional Logic for Local Reasoning about Global Invariants., , и . ECOOP, том 5142 из Lecture Notes in Computer Science, стр. 387-411. Springer, (2008)Mechanized verification of fine-grained concurrent programs., , и . PLDI, стр. 77-87. ACM, (2015)