Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Augmenting Bug Localization with Part-of-Speech and Invocation., , , and . International Journal of Software Engineering and Knowledge Engineering, 27 (6): 925-950 (2017)Making Agents' Abilities Explicit., , and . IEEE Access, (2019)EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis., , , and . Proc. ACM Program. Lang., 8 (POPL): 848-881 (January 2024)On Finite Alphabets and Infinite Bases II: Completed and Ready Simulation., , and . FoSSaCS, volume 3921 of Lecture Notes in Computer Science, page 1-15. Springer, (2006)On the Axiomatizability of Impossible Futures., , and . Logical Methods in Computer Science, (2015)Ready to preorder: The case of weak process semantics., , and . Inf. Process. Lett., 109 (2): 104-111 (2008)Orbit Problem Revisited, , and . CoRR, (2013)Model-based Automated Testing of JavaScript Web Applications via Longer Test Sequences., , , , and . CoRR, (2019)Tractability of Separation Logic with Inductive Definitions: Beyond Lists., , and . CONCUR, volume 85 of LIPIcs, page 37:1-37:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs., , , and . ACM Trans. Softw. Eng. Methodol., 30 (3): 26:1-26:42 (2021)