Author of the publication

Formal verification of data-intensive applications through model checking modulo theories.

, , , , and . SPIN, page 98-101. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synthesis of optimal numerical algorithms using real quantifier elimination (case study: square root computation)., and . ISSAC, page 162-169. ACM, (2014)An Architecture for a Management Agency for Cloud Resources., , and . SYNASC, page 288-295. IEEE, (2018)A Tool for Fake News Detection., and . SYNASC, page 379-386. IEEE, (2018)A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services., , , , and . CISIS, page 549-554. IEEE Computer Society, (2016)SAGE - A Tool for Optimal Deployments in Kubernetes Clusters., and . CloudCom, page 10-17. IEEE, (2023)Efficient Simplification Techniques for Special Real Quantifier Elimination with Applications to the Synthesis of Optimal Numerical Algorithms.. CASC, volume 9890 of Lecture Notes in Computer Science, page 193-211. Springer, (2016)A tool for verification of big-data applications., , , and . QUDOS@ISSTA, page 44-45. ACM, (2016)A Calculus for Imperative Programs: Formalization and Implementation., and . SYNASC, page 77-84. IEEE Computer Society, (2009)Semi-automatic analysis of algorithm complexity (Case study: Square-root computation).. SISY, page 67-72. IEEE, (2014)Benchmarking Optimization Solvers and Symmetry Breakers for the Automated Deployment of Component-based Applications in the Cloud (EXTENDED ABSTRACT)., and . CoRR, (2023)