Author of the publication

Trace-Based Symbolic Analysis for Atomicity Violations.

, , , and . TACAS, volume 6015 of Lecture Notes in Computer Science, page 328-342. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Localization and Register Sharing for Predicate Abstraction., , , and . TACAS, volume 3440 of Lecture Notes in Computer Science, page 397-412. Springer, (2005)Efficient Modeling of Embedded Memories in Bounded Model Checking., , and . CAV, volume 3114 of Lecture Notes in Computer Science, page 440-452. Springer, (2004)Reasoning About Threads Communicating via Locks., , and . CAV, volume 3576 of Lecture Notes in Computer Science, page 505-518. Springer, (2005)Model Checking Concurrent Programs.. VMCAI, volume 5403 of Lecture Notes in Computer Science, page 2. Springer, (2009)Interprocedural Exception Analysis for C++., , , , and . ECOOP, volume 6813 of Lecture Notes in Computer Science, page 583-608. Springer, (2011)From Hardware Verification to Software Verification: Re-use and Re-learn.. Haifa Verification Conference, volume 4899 of Lecture Notes in Computer Science, page 14-15. Springer, (2007)Generalizing Tandem Simulation: Connecting High-level and RTL Simulation Models., , and . ASP-DAC, page 154-159. IEEE, (2022)DTAM: dynamic taint analysis of multi-threaded programs for relevancy., , and . SIGSOFT FSE, page 46. ACM, (2012)Fold/Unfold Transformations for Fixpoint Logic., , and . TACAS (2), volume 12079 of Lecture Notes in Computer Science, page 195-214. Springer, (2020)Usage-Based RTL Subsetting for Hardware Accelerators., , and . ICCAD, page 73:1-73:9. ACM, (2022)