Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Haskell's overlooked object system, and . CoRR, (2005)Finally, safely-extensible and efficient language-integrated query., , and . PEPM, page 37-48. ACM, (2016)Non-canonical Coordination in the Transformational Approach.. JSAI-isAI Workshops, volume 10247 of Lecture Notes in Computer Science, page 33-44. Springer, (2016)Applicative Abstract Categorial Grammars in Full Swing.. JSAI-isAI Workshops, volume 10091 of Lecture Notes in Computer Science, page 66-78. (2015)Many more predecessors: A representation workout.. J. Funct. Program., (2020)Comment on Ön the Application of a Popular Notation to Semantics" and reply from the Autor., and . ACM SIGPLAN Notices, 34 (12): 35-36 (1999)Polynomial Event Semantics - Non-Montagovian Proper Treatment of Quantifiers.. JSAI-isAI Workshops, volume 11717 of Lecture Notes in Computer Science, page 313-324. Springer, (2018)Secure Counting: counting members of a subset without revealing their identities. CoRR, (2001)Implementing Metcast in Scheme.. High. Order Symb. Comput., 18 (3-4): 355-370 (2005)The reasoned schemer., , and . MIT Press, (2005)