Author of the publication

Cactus Environment Machine - Shared Environment Call-by-Need.

, , , and . TFP, volume 10447 of Lecture Notes in Computer Science, page 24-43. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Review of The Computational Beauty of Nature by Gary William Flake., and . Artif. Intell., 128 (1-2): 239-242 (2001)Negative representations of information., , and . Int. J. Inf. Sec., 8 (5): 331-345 (2009)Autonomous security for autonomous systems., , and . Computer Networks, 52 (15): 2908-2923 (2008)Genetic Algorithms, Operators, and DNA Fragment Assembly., , and . Machine Learning, 21 (1-2): 11-33 (1995)Application and analysis of multidimensional negative surveys in participatory sensing applications., , , , and . Pervasive and Mobile Computing, 9 (3): 372-391 (2013)The Performance of Genetic Algorithms on Walsh Polynomials: Some Anomalous Results and Their Explanation., and . ICGA, page 182-189. Morgan Kaufmann, (1991)Moving Target Defenses in the Helix Self-Regenerative Architecture., , , , , , , and . Moving Target Defense, volume 100 of Advances in Information Security, Springer, (2013)Coverage and Generalization in an Artificial Immune System., , , and . GECCO, page 3-10. Morgan Kaufmann, (2002)Trusted Software Repair for System Resiliency., , , , and . DSN Workshops, page 238-241. IEEE Computer Society, (2016)Internet Topology over Time, , , and . CoRR, (2012)