Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Faithful Ideal Models for Recursive Polymorphic Types., , and . Int. J. Found. Comput. Sci., 2 (1): 1-21 (1991)Simple Type-Theoretic Foundations for Object-Oriented Programming., and . J. Funct. Program., 4 (2): 207-247 (1994)Special Issue Dedicated to ICFP 2011 Editorial., and . J. Funct. Program., 23 (4): 355-356 (2013)Statically Typed Document Transformation: An Xtatic Experience., , and . PLAN-X, page 2-13. BRICS, Department of Computer Science, University of Aarhus, (2006)Differential Privacy Under Fire., , and . USENIX Security Symposium, USENIX Association, (2011)Featherweight Firefox: Formalizing the Core of a Web Browser., and . WebApps, USENIX Association, (2010)Types and Programming Languages: The Next Generation.. LICS, page 32-. IEEE Computer Society, (2003)Explicit Secrecy: A Policy for Taint Tracking., , , and . EuroS&P, page 15-30. IEEE, (2016)The essence of objects.. ACM SIGSOFT Software Engineering Notes, 25 (1): 69-71 (2000)Guest editorial., and . ACM Trans. Program. Lang. Syst., 26 (5): 767-768 (2004)