Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alias Analysis of Executable Code., , and . POPL, page 12-24. ACM, (1998)Functional Computations in Logic Programs., and . ACM Trans. Program. Lang. Syst., 11 (3): 451-481 (1989)jc: An Efficient and Portable Sequential Implementation of Janus., , and . JICSLP, page 399-413. MIT Press, (1992)Understanding Finiteness Analysis Using Abstract Interpretation., , and . JICSLP, page 735-749. MIT Press, (1992)A Simple Code Improvement Scheme for Prolog.. ICLP, page 17-32. MIT Press, (1989)long version: JLP 13: 57-88 (1992).Non-Failure Analysis for Logic Programs., , and . ICLP, page 48-62. MIT Press, (1997)On the Existence and Construction of Robust Communication Protocals for Unreliable Channels., , and . FSTTCS, volume 181 of Lecture Notes in Computer Science, page 136-151. Springer, (1984)Detection and Optimization of Suspension-Free Logic Programs., , and . J. Log. Program., 29 (1-3): 171-194 (1996)Unfold/Fold Transformations and Loop Optimization of Logic Programs.. PLDI, page 297-307. ACM, (1988)Deobfuscation: Reverse Engineering Obfuscated Code., , and . WCRE, page 45-54. IEEE Computer Society, (2005)