Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coupled Schema Transformation and Data Conversion for XML and SQL., , , and . PADL, volume 4354 of Lecture Notes in Computer Science, page 290-304. Springer, (2007)Jasmin: High-Assurance and High-Speed Cryptography., , , , , , , , , and . ACM Conference on Computer and Communications Security, page 1807-1823. ACM, (2017)Mapping between Alloy Specifications and Database Implementations., and . SEFM, page 285-294. IEEE Computer Society, (2009)A Clear Picture of Lens Laws - Functional Pearl., , and . MPC, volume 9129 of Lecture Notes in Computer Science, page 215-223. Springer, (2015)Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks., , , , , and . CSF, page 132-146. IEEE Computer Society, (2018)BiFluX: A Bidirectional Functional Update Language for XML., , and . PPDP, page 147-158. ACM, (2014)Calculating with lenses: optimising bidirectional transformations., and . PEPM, page 91-100. ACM, (2011)A Generic Scheme and Properties of Bidirectional Transformations., , , and . CoRR, (2013)A formal treatment of the role of verified compilers in secure computation., , , , , and . J. Log. Algebraic Methods Program., (2022)Classifying Execution Times in Parallel Computing Systems: A Classical Hypothesis Testing Approach., , , , and . CIARP, volume 7042 of Lecture Notes in Computer Science, page 709-717. Springer, (2011)