Author of the publication

Decomposition by tree dimension in Horn clause verification.

, , and . VPT@ETAPS, volume 199 of EPTCS, page 1-14. (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regular Expression Search on Compressed Text., and . DCC, page 528-537. IEEE, (2019)A Language-theoretic View on Network Protocols., , and . CoRR, (2016)Parikh Image of Pushdown Automata., and . FCT, volume 10472 of Lecture Notes in Computer Science, page 271-283. Springer, (2017)Verification of population protocols., , , and . Acta Informatica, 54 (2): 191-215 (2017)Pattern-Based Verification for Multithreaded Programs., , and . ACM Trans. Program. Lang. Syst., 36 (3): 9:1-9:29 (2014)Decomposition by tree dimension in Horn clause verification., , and . VPT@ETAPS, volume 199 of EPTCS, page 1-14. (2015)A Quasiorder-Based Perspective on Residual Automata., , and . MFCS, volume 170 of LIPIcs, page 40:1-40:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)From non-zenoness verification to termination., , , and . MEMOCODE, page 228-237. IEEE, (2015)Generating Bounded Languages Using Bounded Control Sets., and . CoRR, (2014)Underapproximation of procedure summaries for integer programs., , and . Int. J. Softw. Tools Technol. Transf., 19 (5): 565-584 (2017)