Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code., , , and . EuroS&P, page 687-706. IEEE, (2023)Efficient Automated Reasoning About Sets and Multisets with Cardinality Constraints.. IJCAR (1), volume 12166 of Lecture Notes in Computer Science, page 3-10. Springer, (2020)Decision Procedures for Program Synthesis and Verification.. EPFL, Switzerland, (2011)Synthesizing functional reactive programs., , , and . Haskell@ICFP, page 162-175. ACM, (2019)PyDex: Repairing Bugs in Introductory Python Assignments using LLMs., , , , , , and . Proc. ACM Program. Lang., 8 (OOPSLA1): 1100-1124 (2024)Identifying Maximal Non-Redundant Integer Cone Generators., , and . CoRR, (2019)Using pre-trained language models to resolve textual and semantic merge conflicts (experience paper)., , , , and . ISSTA, page 77-88. ACM, (2022)Grammar Filtering for Syntax-Guided Synthesis., , , , and . AAAI, page 1611-1618. AAAI Press, (2020)Programming by Example: Efficient, but Not "Helpful"., , , and . PLATEAU@SPLASH, volume 67 of OASIcs, page 3:1-3:10. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Automated repair by example for firewalls., , and . FMCAD, page 220-229. IEEE, (2017)