| Publication | Date of Publication | Type |
|---|
Robustly safe compilation Programming Languages and Systems | 2023-11-24 | Paper |
Trace-relating compiler correctness and secure compilation Programming Languages and Systems | 2022-10-13 | Paper |
A linear logic of authorization and knowledge Computer Security – ESORICS 2006 | 2022-03-09 | Paper |
Relational cost analysis in a functional-imperative setting Journal of Functional Programming | 2022-01-07 | Paper |
A partitioned solver for compressible/incompressible fluid flow and light structure Computers & Mathematics with Applications | 2021-10-19 | Paper |
Variance-stabilization-based compressive inversion under Poisson or Poisson–Gaussian noise with analytical bounds Inverse Problems | 2019-09-20 | Paper |
Relational reasoning for Markov chains in a probabilistic guarded lambda calculus (available as arXiv preprint) | 2019-09-13 | Paper |
Computation of compressible and incompressible flows with a space-time stabilized finite element method Computers & Mathematics with Applications | 2019-07-03 | Paper |
Modeling free surface flows using stabilized finite element method Mathematical Problems in Engineering | 2019-02-08 | Paper |
Extended suffix array construction using Lyndon factors Sādhanā | 2018-10-31 | Paper |
Approximation algorithm for resource allocation problems with time dependent penalties International Journal of Foundations of Computer Science | 2018-05-14 | Paper |
Causally Consistent Dynamic Slicing (available as arXiv preprint) | 2018-03-21 | Paper |
Relational cost analysis Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages | 2017-10-20 | Paper |
Countermodels from sequent calculi in multi-modal logics 2012 27th Annual IEEE Symposium on Logic in Computer Science | 2017-05-16 | Paper |
A type theory for incremental computational complexity with control flow changes Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming | 2017-05-10 | Paper |
Compositional system security with interface-confined adversaries Electronic Notes in Theoretical Computer Science | 2016-07-08 | Paper |
Refinement types for incremental computational complexity Programming Languages and Systems | 2016-04-26 | Paper |
Dynamic task allocation in distributed computing systems by heuristic algorithms International Journal of Operational Research | 2015-06-24 | Paper |
Superficially substructural types Proceedings of the 17th ACM SIGPLAN international conference on Functional programming | 2014-07-21 | Paper |
Computability of spiking neural P systems with anti-spikes New Mathematics and Natural Computation | 2014-01-30 | Paper |
On string languages generated by spiking neural P systems with anti-spikes International Journal of Foundations of Computer Science | 2011-02-23 | Paper |
A Modal Deconstruction of Access Control Logics Foundations of Software Science and Computational Structures | 2008-04-11 | Paper |
A NEW MIDDLE PATH APPROACH FOR ALIGNMENTS IN BLAST Journal of Biological Systems | 2007-06-12 | Paper |
CONCUR 2005 – Concurrency Theory Lecture Notes in Computer Science | 2006-11-01 | Paper |
| scientific article; zbMATH DE number 2163040 (Why is no real title available?) | 2005-04-29 | Paper |