Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Yessenov, Kuat
add a person with the name Yessenov, Kuat
 

Other publications of authors with the same name

A language for automatically enforcing privacy policies., , and . POPL, page 85-96. ACM, (2012)A colorful approach to text processing by example., , , , , , and . UIST, page 495-504. ACM, (2013)Stepwise refinement of heap-manipulating code in Chalice., and . Formal Asp. Comput., 24 (4-6): 519-535 (2012)Unifying execution of imperative and declarative code., , , and . ICSE, page 511-520. ACM, (2011)Bounded Verification of Voting Software., , and . VSTTE, volume 5295 of Lecture Notes in Computer Science, page 130-145. Springer, (2008)Data-driven synthesis for object-oriented frameworks., , and . OOPSLA, page 65-82. ACM, (2011)Agile specifications., , , , and . OOPSLA Companion, page 999-1006. ACM, (2009)DemoMatch: API discovery from demonstrations., , and . PLDI, page 64-78. ACM, (2017)Collections, Cardinalities, and Relations., , and . VMCAI, volume 5944 of Lecture Notes in Computer Science, page 380-395. Springer, (2010)Program synthesis from execution traces and demonstrations.. Massachusetts Institute of Technology, Cambridge, USA, (2016)ndltd.org (oai:dspace.mit.edu:1721.1/106098).