Author of the publication

Static Detection of DoS Vulnerabilities in Programs that Use Regular Expressions.

, , , and . TACAS (2), volume 10206 of Lecture Notes in Computer Science, page 3-20. (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAT-Inspired Eliminations for Superposition., , and . ACM Trans. Comput. Log., 24 (1): 7:1-7:25 (January 2023)The DRAT format and DRAT-trim checker.. CoRR, (2016)Without Loss of Satisfaction.. ICTAC, volume 14446 of Lecture Notes in Computer Science, page 4-14. Springer, (2023)Truth Assignments as Conditional Autarkies., , and . ATVA, volume 11781 of Lecture Notes in Computer Science, page 48-64. Springer, (2019)Preprocessing of Propagation Redundant Clauses., , and . IJCAR, volume 13385 of Lecture Notes in Computer Science, page 106-124. Springer, (2022)SAT Competition 2018., , and . J. Satisf. Boolean Model. Comput., 11 (1): 133-154 (2019)Trimming Graphs Using Clausal Proof Optimization.. CP, volume 11802 of Lecture Notes in Computer Science, page 251-267. Springer, (2019)Avoiding Monochromatic Rectangles Using Shift Patterns., , and . SOCS, page 225-227. AAAI Press, (2021)Towards the shortest DRAT proof of the Pigeonhole Principle., , and . CoRR, (2022)Exponential Separations Using Guarded Extension Variables., and . ITCS, volume 251 of LIPIcs, page 101:1-101:22. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)