Personensuche
X
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
1
Expressive Authorization Policies using Computation Princip..:
, In:
?
Proceedings of the 26th ACM International Conference on Hybrid Systems: Computation and Control ,
3
Quantitative Robustness Analysis of Sensor Attacks on Cyber..:
, In:
?
The 34th Annual ACM Symposium on User Interface Software and Technology ,
5
Assuage: Assembly Synthesis Using A Guided Exploration:
, In:
?
Proceedings of the 14th ACM SIGPLAN International Conference on Software Language Engineering ,
6
Fast incremental PEG parsing:
, In:
?
Programming Languages and Systems; Lecture Notes in Computer Science ,
7
Coupled Relational Symbolic Execution for Differential Priv..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
8
Co-Inflow: Coarse-grained Information Flow Control for Java..:
, In:
?
2021 IEEE 34th Computer Security Foundations Symposium (CSF) ,
9
Relational Analysis of Sensor Attacks on Cyber-Physical Sys..:
, In:
?
Proceedings of the 10th Workshop on Programming Languages and Operating Systems ,
14
Trials and Tribulations in Synthesizing Operating Systems:
, In:
?
Proceedings of the 21st International Symposium on Principles and Practice of Declarative Programming ,
15