Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fitting Aggregation Operators., and . MEMICS, volume 9548 of Lecture Notes in Computer Science, page 42-53. Springer, (2015)Cooking String-Integer Conversions with Noodles., , , and . SAT, volume 305 of LIPIcs, page 14:1-14:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2024)Word Equations in Synergy with Regular Constraints., , , , , , and . FM, volume 14000 of Lecture Notes in Computer Science, page 403-423. Springer, (2023)Complementing Büchi Automata with Ranker., , and . CAV (2), volume 13372 of Lecture Notes in Computer Science, page 188-201. Springer, (2022)Modular Mix-and-Match Complementation of Büchi Automata., , , , and . TACAS (1), volume 13993 of Lecture Notes in Computer Science, page 249-270. Springer, (2023)A Symbolic Algorithm for the Case-Split Rule in String Constraint Solving., , , and . APLAS, volume 12470 of Lecture Notes in Computer Science, page 343-363. Springer, (2020)Deep Packet Inspection in FPGAs via Approximate Nondeterministic Automata., , , , , , , , and . FCCM, page 109-117. IEEE, (2019)Efficient Modelling of ICS Communication For Anomaly Detection Using Probabilistic Automata., , and . IM, page 81-89. IEEE, (2021)Antiprenexing for WSkS: A Little Goes a Long Way., , , , and . LPAR, volume 73 of EPiC Series in Computing, page 298-316. EasyChair, (2020)Approximate Reduction of Finite Automata for High-Speed Network Intrusion Detection., , , , and . TACAS (2), volume 10806 of Lecture Notes in Computer Science, page 155-175. Springer, (2018)