Author of the publication

Formal Methods and Computing Identity-based Mentorship for Early Stage Researchers.

, and . SIGCSE, page 135-141. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Automated Reasoning About Sets and Multisets with Cardinality Constraints.. IJCAR (1), volume 12166 of Lecture Notes in Computer Science, page 3-10. Springer, (2020)Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code., , , and . EuroS&P, page 687-706. IEEE, (2023)Decision Procedures for Program Synthesis and Verification.. EPFL, Switzerland, (2011)Synthesizing functional reactive programs., , , and . Haskell@ICFP, page 162-175. ACM, (2019)PyDex: Repairing Bugs in Introductory Python Assignments using LLMs., , , , , , and . Proc. ACM Program. Lang., 8 (OOPSLA1): 1100-1124 (2024)Identifying Maximal Non-Redundant Integer Cone Generators., , and . CoRR, (2019)Grammar Filtering for Syntax-Guided Synthesis., , , , and . AAAI, page 1611-1618. AAAI Press, (2020)Using pre-trained language models to resolve textual and semantic merge conflicts (experience paper)., , , , and . ISSTA, page 77-88. ACM, (2022)Automated repair by example for firewalls., , and . FMCAD, page 220-229. IEEE, (2017)Verification of an Off-Line Checker for Priority Queues., and . SEFM, page 210-219. IEEE Computer Society, (2005)