Author of the publication

SMT-Based Reasoning for Uncertain Hybrid Domains.

, and . AAAI Workshop: Planning for Hybrid Systems, volume WS-16-12 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ESBMC-CHERI: towards verification of C programs for CHERI platforms with ESBMC., , , , , , and . ISSTA, page 773-776. ACM, (2022)Individualised computational modelling of immune mediated disease onset, flare and clearance in psoriasis., , , , and . PLoS Comput. Biol., 18 (9): 1010267 (September 2022)SMT-Based Reasoning for Uncertain Hybrid Domains., and . AAAI Workshop: Planning for Hybrid Systems, volume WS-16-12 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.Probabilistic Reachability for Uncertain Stochastic Hybrid Systems via Gaussian Processes., , and . MEMOCODE, page 1-11. IEEE, (2020)ARCH-COMP23 Category Report: Stochastic Models., , , , , , , , , and 4 other author(s). ARCH, volume 96 of EPiC Series in Computing, page 126-150. EasyChair, (2023)ESBMC v7.4: Harnessing the Power of Intervals - (Competition Contribution)., , , , , , , , , and 2 other author(s). TACAS (3), volume 14572 of Lecture Notes in Computer Science, page 376-380. Springer, (2024)Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs., , , , , and . IEEE Access, (2022)Probabilistic bounded reachability for stochastic hybrid systems.. Newcastle University, Newcastle upon Tyne, UK, (2018)British Library, EThOS.Position Paper: Towards a Hybrid Approach to Protect Against Memory Safety Vulnerabilities., , , , , , , , , and . SecDev, page 52-58. IEEE, (2022)Probabilistic Hybrid Systems Verification via SMT and Monte Carlo Techniques., and . Haifa Verification Conference, volume 10028 of Lecture Notes in Computer Science, page 152-168. (2016)