From post

A Combination of Rewriting and Constraint Solving for the Quantifier-Free Interpolation of Arrays with Integer Difference Constraints.

, , и . FroCoS, том 6989 из Lecture Notes in Computer Science, стр. 103-118. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution., , , и . SECRYPT, стр. 147-158. SciTePress, (2016)The SMT-LIB Initiative and the Rise of SMT - (HVC 2010 Award Talk)., , , , и . Haifa Verification Conference, том 6504 из Lecture Notes in Computer Science, стр. 3. Springer, (2010)Selective Release of Smart Metering Data in Multi-domain Smart Grids., , , , , и . SmartGridSec, том 8448 из Lecture Notes in Computer Science, стр. 48-62. Springer, (2014)From Strong Amalgamability to Modularity of Quantifier-Free Interpolation., , и . IJCAR, том 7364 из Lecture Notes in Computer Science, стр. 118-133. Springer, (2012)Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem: Scalability and Reusability., , и . SACMAT, стр. 89-99. ACM, (2016)On the Automated Analysis of Safety in Usage Control: A New Decidability Result., и . NSS, том 7645 из Lecture Notes in Computer Science, стр. 15-28. Springer, (2012)A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies., , и . STM, том 9331 из Lecture Notes in Computer Science, стр. 55-71. Springer, (2015)A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study., , , и . SACMAT, стр. 235-246. ACM, (2018)Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection., , и . ICETE (2), стр. 349-356. ScitePress, (2020)SARA: Secure Asynchronous Remote Attestation for IoT Systems., , , , и . IEEE Trans. Inf. Forensics Secur., (2020)