Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measure Transformer Semantics for Bayesian Machine Learning., , , , and . Log. Methods Comput. Sci., (2013)A Lambda-Calculus Foundation for Universal Probabilistic Programming., , , and . CoRR, (2015)Stack inspection: Theory and variants., and . ACM Trans. Program. Lang. Syst., 25 (3): 360-399 (2003)Verified interoperable implementations of security protocols., , , and . ACM Trans. Program. Lang. Syst., 31 (1): 5:1-5:61 (2008)Deciding validity in a spatial logic for trees., , and . J. Funct. Program., 15 (4): 543-572 (2005)A Calculus for Cryptographic Protocols: The spi Calculus., and . Inf. Comput., 148 (1): 1-70 (1999)Secrecy and group creation., , and . Inf. Comput., 196 (2): 127-155 (2005)Spreadsheet Use and Programming Experience: An Exploratory Survey., , , , , , , and . CHI Extended Abstracts, page 1-9. ACM, (2020)Rows from Many Sources: Enriching row completions from Wikidata with a pre-trained Language Model., , , , , , and . WWW (Companion Volume), page 1272-1280. ACM, (2022)Bayesian inference using data flow analysis., , , , and . ESEC/SIGSOFT FSE, page 92-102. ACM, (2013)