Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-canonical Coordination in the Transformational Approach.. JSAI-isAI Workshops, volume 10247 of Lecture Notes in Computer Science, page 33-44. Springer, (2016)Applicative Abstract Categorial Grammars in Full Swing.. JSAI-isAI Workshops, volume 10091 of Lecture Notes in Computer Science, page 66-78. (2015)Haskell's overlooked object system, and . CoRR, (2005)Finally, safely-extensible and efficient language-integrated query., , and . PEPM, page 37-48. ACM, (2016)Many more predecessors: A representation workout.. J. Funct. Program., (2020)Comment on Ön the Application of a Popular Notation to Semantics" and reply from the Autor., and . ACM SIGPLAN Notices, 34 (12): 35-36 (1999)Polynomial Event Semantics - Non-Montagovian Proper Treatment of Quantifiers.. JSAI-isAI Workshops, volume 11717 of Lecture Notes in Computer Science, page 313-324. Springer, (2018)Secure Counting: counting members of a subset without revealing their identities. CoRR, (2001)Implementing Metcast in Scheme.. High. Order Symb. Comput., 18 (3-4): 355-370 (2005)Staging and high-performance computing: theory and practice (NII Shonan Meeting 2014-7)., , and . NII Shonan Meet. Rep., (2014)