Author of the publication

Verifying an HTTP Key-Value Server with Interaction Trees and VST.

, , , , , , , , , and . ITP, volume 193 of LIPIcs, page 32:1-32:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Story of Your Lazy Function's Life: A Bidirectional Demand Semantics for Mechanized Cost Analysis of Lazy Programs., , , , , , and . CoRR, (2024)From C to Interaction Trees: Specifying, Verifying, and Testing a Networked Server., , , , , , , , and . CoRR, (2018)From C to interaction trees: specifying, verifying, and testing a networked server., , , , , , , , and . CPP, page 234-248. ACM, (2019)Verifying an HTTP Key-Value Server with Interaction Trees and VST., , , , , , , , , and . ITP, volume 193 of LIPIcs, page 32:1-32:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Theano: A Python framework for fast computation of mathematical expressions, , , , , , , , , and 103 other author(s). (2016)cite arxiv:1605.02688Comment: 19 pages, 5 figures.House vacancy at urban areas in China with nocturnal light data of DMSP-OLS., and . ICSDM, page 457-462. IEEE, (2011)A Strong Baseline for Domain Adaptation and Generalization in Medical Imaging., , , and . CoRR, (2019)The comparison of electric fields distribution applying various coil configurations in Deep Transcranial magnetic stimulation., , , , , and . CISP-BMEI, page 1-5. IEEE, (2017)Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network., , , and . CoRR, (2018)A Filling Algorithm of Mining Constraint Frequent Neighboring Class Set., , , and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 175-182. Springer, (2012)