Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Orderings and Constraints: Theory and Practice of Proving Termination., and . Rewriting, Computation and Proof, volume 4600 of Lecture Notes in Computer Science, page 28-43. Springer, (2007)A Fully Syntactic AC-RPO.. RTA, volume 1631 of Lecture Notes in Computer Science, page 133-147. Springer, (1999)A Precedence-Based Total AC-Compatible Ordering., and . RTA, volume 690 of Lecture Notes in Computer Science, page 374-388. Springer, (1993)Running on Fumes - Preventing Out-of-Gas Vulnerabilities in Ethereum Smart Contracts Using Static Resource Analysis., , , and . VECoS, volume 11847 of Lecture Notes in Computer Science, page 63-78. Springer, (2019)AC-Superposition with Constraints: No AC-Unifiers Needed., and . CADE, volume 814 of Lecture Notes in Computer Science, page 545-559. Springer, (1994)Basic Superposition is Complete., and . ESOP, volume 582 of Lecture Notes in Computer Science, page 371-389. Springer, (1992)Inferring Needless Write Memory Accesses on Ethereum Bytecode., , , , and . TACAS (1), volume 13993 of Lecture Notes in Computer Science, page 448-466. Springer, (2023)A Max-SMT Superoptimizer for EVM handling Memory and Storage., , , and . TACAS (1), volume 13243 of Lecture Notes in Computer Science, page 201-219. Springer, (2022)Synthesis of Super-Optimized Smart Contracts Using Max-SMT., , , and . CAV (1), volume 12224 of Lecture Notes in Computer Science, page 177-200. Springer, (2020)Inferring Needless Write Memory Accesses on Ethereum Bytecode (Extended Version)., , , , and . CoRR, (2023)