Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specification, verification, and synthesis of concurrency control components., and . ISSTA, page 169-179. ACM, (2002)String Analysis for Vulnerability Detection and Repair.. SPIN, volume 9232 of Lecture Notes in Computer Science, page 3-9. Springer, (2015)Construction of Efficient BDDs for Bounded Arithmetic Constraints., and . TACAS, volume 2619 of Lecture Notes in Computer Science, page 394-408. Springer, (2003)Binary Reachability Analysis of Discrete Pushdown Timed Automata., , , , and . CAV, volume 1855 of Lecture Notes in Computer Science, page 69-84. Springer, (2000)An integrated data model verifier with property templates., , and . FormaliSE@ICSE, page 29-35. IEEE Computer Society, (2013)Subformula Caching for Model Counting and Quantitative Program Analysis., , , and . ASE, page 453-464. IEEE, (2019)Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses., , and . ASE, page 605-609. IEEE Computer Society, (2009)Design for verification for asynchronously communicating Web services., , and . WWW, page 750-759. ACM, (2005)Symbolic Model Checking of Infinite State Systems Using Presburger Arithmetic., , and . CAV, volume 1254 of Lecture Notes in Computer Science, page 400-411. Springer, (1997)Symbolic path cost analysis for side-channel detection., , and . ICSE (Companion Volume), page 424-425. ACM, (2018)