Author of the publication

Model Checking Boot Code from AWS Data Centers.

, , , , , and . CAV (2), volume 10982 of Lecture Notes in Computer Science, page 467-486. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Timing Games and Shared Memory., , and . DISC, volume 3724 of Lecture Notes in Computer Science, page 507-508. Springer, (2005)Model checking boot code from AWS data centers., , , , , and . Formal Methods Syst. Des., 57 (1): 34-52 (2021)Hierarchical Correctness Proofs for Distributed Algorithms., and . PODC, page 137-151. ACM, (1987)Knowledge, Probability, and Adversaries., and . PODC, page 103-118. ACM, (1989)A Semantics for a Logic of Authentication (Extended Abstract)., and . PODC, page 201-216. ACM, (1991)Collaboration of untrusting peers with changing interests., , , and . EC, page 112-119. ACM, (2004)Protocol Proof Checking Simplified with SMT., and . NCA, page 195-202. IEEE Computer Society, (2012)SMT-Based System Verification with DVF., , , and . SMT@IJCAR, volume 20 of EPiC Series in Computing, page 32-43. EasyChair, (2012)A Theory of Redo Recovery., and . SIGMOD Conference, page 397-406. ACM, (2003)Many random walks are faster than one., , , , , and . SPAA, page 119-128. ACM, (2008)