Author of the publication

Bounded Model Checking of Recursive Programs with Pointers in K.

, , , , and . WADT, volume 7841 of Lecture Notes in Computer Science, page 59-76. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis., , , and . SPRO@CCS, page 3-14. ACM, (2019)Interacting via the Heap in the Presence of Recursion, , , , and . ICE, volume 104 of EPTCS, page 99-113. (2012)Context-Updates Analysis and Refinement in Chisel., , and . SPIN, volume 10869 of Lecture Notes in Computer Science, page 328-346. Springer, (2018)Software Model Checking for Mobile Security - Collusion Detection in K K., , and . SPIN, volume 10869 of Lecture Notes in Computer Science, page 3-25. Springer, (2018)Bounded Model Checking of Recursive Programs with Pointers in K., , , , and . WADT, volume 7841 of Lecture Notes in Computer Science, page 59-76. Springer, (2012)On Abstractions for Timing Analysis in the $K$ Framework., , and . FOPARA, volume 7177 of Lecture Notes in Computer Science, page 90-107. Springer, (2011)Memory Policy Analysis for Semantics Specifications in Maude., , and . LOPSTR, volume 9527 of Lecture Notes in Computer Science, page 293-310. Springer, (2015)Using the Executable Semantics for CFG Extraction and Unfolding., and . SYNASC, page 123-127. IEEE Computer Society, (2011)Model checking recursive programs interacting via the heap., , , , and . Sci. Comput. Program., (2015)A Generic Program Slicing Technique Based on Language Definitions., , and . WADT, volume 7841 of Lecture Notes in Computer Science, page 248-264. Springer, (2012)