From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enforcing resource bounds via static verification of dynamic checks., , , , и . ACM Trans. Program. Lang. Syst., 29 (5): 28 (2007)CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs., , , и . CC, том 2304 из Lecture Notes in Computer Science, стр. 213-228. Springer, (2002)Lightweight Wrappers for Interfacing with Binary Code in CCured., и . ISSS, том 3233 из Lecture Notes in Computer Science, стр. 209-225. Springer, (2003)Mining Temporal Specifications for Error Detection., и . TACAS, том 3440 из Lecture Notes in Computer Science, стр. 461-476. Springer, (2005)CCured: type-safe retrofitting of legacy code., , и . ACM SIGPLAN Notices, 47 (4a): 74-85 (2012)A logic-based approach to software system safety and security., и . ACM SIGSOFT Softw. Eng. Notes, 25 (1): 67-68 (2000)Efficient Representation and Validation of Proofs., и . LICS, стр. 93-104. IEEE Computer Society, (1998)Join Algorithms for the Theory of Uninterpreted Functions., , и . FSTTCS, том 3328 из Lecture Notes in Computer Science, стр. 311-323. Springer, (2004)Beyond Bug-Finding: Sound Program Analysis for Linux., , , , , , , и . HotOS, USENIX Association, (2007)The Design and Implementation of a Certifying Compiler., и . PLDI, стр. 333-344. ACM, (1998)