Jensen, Thomas J.
137  Ergebnisse:
Personensuche X
?
1

Type-directed Program Transformation for Constant-Time Enfo..:

, In: Proceedings of the 25th International Symposium on Principles and Practice of Declarative Programming,
 
?
2

MichelsonLiSA: A Static Analyzer for Tezos:

, In: 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops),
 
?
3

Lifting Numeric Relational Domains to Algebraic Data Types:

, In: Static Analysis; Lecture Notes in Computer Science,
 
?
4

Trace-based control-flow analysis:

, In: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation,
Montagu, Benoît ; Jensen, Thomas - p. 482-496 , 2021
 
?
5

Numeric domains meet algebraic data types:

, In: Proceedings of the 9th ACM SIGPLAN International Workshop on Numerical and Symbolic Abstract Domains,
 
?
6

Galois Connections for Recursive Types:

, In: From Lambda Calculus to Cybersecurity Through Program Analysis; Lecture Notes in Computer Science,
 
?
7

Compiling Sandboxes: Formally Verified Software Fault Isola..:

, In: Programming Languages and Systems; Lecture Notes in Computer Science,
 
?
8

Navigating Global Online Market Places (GOMPs) – An ADR Per..:

, In: IFIP Advances in Information and Communication Technology; ICT Unbounded, Social Impact of Bright ICT Adoption,
Baiyere, Abayomi ; Jensen, Thomas ; Fischer, Louise... - p. 529-535 , 2019
 
?
9

Weight-Mate : Adaptive Training Support for Weight Lifti..:

, In: Proceedings of the 31st Australian Conference on Human-Computer-Interaction,
 
?
10

Where to Now? New E-learning Concepts and Co-creation at th..:

, In: Communications in Computer and Information Science; Information Literacy in the Workplace,
Cranfield, Andrew ; Jensen, Thomas - p. 576-584 , 2018
 
?
11

Securing Compilation Against Memory Probing:

, In: Proceedings of the 13th Workshop on Programming Languages and Analysis for Security,
 
?
12

Declarative cartography under fine-grained access control:

, In: Proceedings of the 30th International Conference on Scientific and Statistical Database Management,
 
?
13

Verifying Higher-Order Functions with Tree Automata:

, In: Lecture Notes in Computer Science; Foundations of Software Science and Computation Structures,
 
?
14

Modular Software Fault Isolation as Abstract Interpretation:

, In: Static Analysis; Lecture Notes in Computer Science,
 
?
15

Certified Abstract Interpretation with Pretty-Big-Step Sema..:

, In: Proceedings of the 2015 Conference on Certified Programs and Proofs,
 
1-15