Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proving unreachability using bounded model checking., , and . ISEC, page 73-82. ACM, (2010)Feature based Structuring and Composing of SDLC Artifacts., , , and . SEKE, page 583-586. Knowledge Systems Institute Graduate School, (2010)Cooperative and Non-Cooperative Control in IEEE 802.11 WLANs, , , and . page 1663-1672. (2005)VeriFuzz: Program Aware Fuzzing - (Competition Contribution)., , and . TACAS (3), volume 11429 of Lecture Notes in Computer Science, page 244-249. Springer, (2019)VeriAbs : Verification by Abstraction and Test Generation (Competition Contribution)., , , , , , , , , and . TACAS (2), volume 12079 of Lecture Notes in Computer Science, page 383-387. Springer, (2020)Over-approximating loops to prove properties using bounded model checking., , , , and . DATE, page 1407-1412. ACM, (2015)Scaling up Model-checking, , , and . (2007)Refining Task Specifications using Model Checking., , , and . RTCSA, page 185-191. IEEE Computer Society, (2018)Model Checking Visual Specification of Requirements., , and . SEFM, page 202-209. IEEE Computer Society, (2003)Implementation of biometrics based security system with integrated techniques., , and . CCSEIT, page 37-42. ACM, (2012)