Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

POMP: Protocol Oblivious SDN Programming with Automatic Multi-Table Pipelining., and . INFOCOM, page 998-1006. IEEE, (2018)Practical Large Universe Attribute-Set Based Encryption in the Standard Model., , , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 180-191. Springer, (2017)Progress of Concurrent Objects., and . Found. Trends Program. Lang., 5 (4): 282-414 (2020)Rely-Guarantee-Based Simulation for Compositional Verification of Concurrent Program Transformations., , and . ACM Trans. Program. Lang. Syst., 36 (1): 3:1-3:55 (2014)AndroidLeaker: A Hybrid Checker for Collusive Leak in Android Applications., and . SETTA, volume 10606 of Lecture Notes in Computer Science, page 164-180. Springer, (2017)Practical Tactics for Verifying C Programs in Coq., , and . CPP, page 97-108. ACM, (2015)An open framework for foundational proof-carrying code., , , and . TLDI, page 67-78. ACM, (2007)Modular Verification of SPARCv8 Code., , and . APLAS, volume 11275 of Lecture Notes in Computer Science, page 245-263. Springer, (2018)Adaptive and reliable message delivery for mobile objects., , , and . GLOBECOM, page 3196-3200. IEEE, (2003)Reliable Message Delivery for Mobile Agents: Push or Pull., , , , and . ICPADS, page 314-320. IEEE Computer Society, (2002)