From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Safe Reinforcement Learning via Shielding., , , , , и . CoRR, (2017)Finding and Fixing Faults., , и . CHARME, том 3725 из Lecture Notes in Computer Science, стр. 35-49. Springer, (2005)Efficient Decision Procedures for Model Checking of Linear Time Logic Properties., , и . CAV, том 1633 из Lecture Notes in Computer Science, стр. 222-235. Springer, (1999)Better Quality in Synthesis through Quantitative Objectives., , , и . CAV, том 5643 из Lecture Notes in Computer Science, стр. 140-156. Springer, (2009)A Comparative Study of Symbolic Algorithms for the Computation of Fair Cycles., , и . FMCAD, том 1954 из Lecture Notes in Computer Science, стр. 143-160. Springer, (2000)Divide and Compose: SCC Refinement for Language Emptiness., , , , и . CONCUR, том 2154 из Lecture Notes in Computer Science, стр. 456-471. Springer, (2001)Automatic Error Localization for Software Using Deductive Verification., , и . Haifa Verification Conference, том 8855 из Lecture Notes in Computer Science, стр. 92-98. Springer, (2014)Debugging Unrealizable Specifications with Model-Based Diagnosis., , и . Haifa Verification Conference, том 6504 из Lecture Notes in Computer Science, стр. 29-45. Springer, (2010)Open Implication., , , и . ICALP (2), том 5126 из Lecture Notes in Computer Science, стр. 361-372. Springer, (2008)RAT: A Tool for the Formal Analysis of Requirements., , , , и . CAV, том 4590 из Lecture Notes in Computer Science, стр. 263-267. Springer, (2007)