From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Precise and scalable points-to analysis via data-driven context tunneling., , и . Proc. ACM Program. Lang., 2 (OOPSLA): 140:1-140:29 (2018)Data-driven context-sensitivity for points-to analysis., , , и . Proc. ACM Program. Lang., 1 (OOPSLA): 100:1-100:28 (2017)Synthesizing Imperative Programs from Examples Guided by Static Analysis., и . SAS, том 10422 из Lecture Notes in Computer Science, стр. 364-381. Springer, (2017)Large Spurious Cycle in Global Static Analyses and Its Algorithmic Mitigation.. APLAS, том 5904 из Lecture Notes in Computer Science, стр. 14-29. Springer, (2009)VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts., , , , и . CoRR, (2019)Selective X-Sensitive Analysis Guided by Impact Pre-Analysis., , , , и . ACM Trans. Program. Lang. Syst., 38 (2): 6:1-6:45 (2016)V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques., , , и . USENIX Security Symposium, стр. 6541-6556. USENIX Association, (2023)Synthesizing regular expressions from examples for introductory automata assignments., , и . GPCE, стр. 70-80. ACM, (2016)SYMTUNER: Maximizing the Power of Symbolic Execution by Adaptively Tuning External Parameters., , , и . ICSE, стр. 2068-2079. ACM, (2022)MemFix: static analysis-based repair of memory deallocation errors for C., , и . ESEC/SIGSOFT FSE, стр. 95-106. ACM, (2018)