Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Grand Challenge: Model Check Software., , and . VISSAS, volume 1 of NATO Security through Science Series D: Information and Communication Security, page 55-68. IOS Press, (2005)Verification of the Futurebus+ Cache Coherence Protocol., , , , , , and . CHDL, volume A-32 of IFIP Transactions, page 15-30. North-Holland, (1993)Efficient Craig interpolation for linear Diophantine (dis)equations and linear modular equations., , and . Formal Methods Syst. Des., 35 (1): 6-39 (2009)Functional Equivalence Verification Tools in High-Level Synthesis Flows., , , and . IEEE Des. Test Comput., 26 (4): 88-95 (2009)Statistical Verification of Probabilistic Properties with Unbounded Until., , and . SBMF, volume 6527 of Lecture Notes in Computer Science, page 144-160. Springer, (2010)Word Level Model Checking - Avoiding the Pentium FDIV Error., , and . DAC, page 645-648. ACM Press, (1996)Verification of All Circuits in a Floating-Point Unit Using Word-Level Model Checking., , , , , , , and . FMCAD, volume 1166 of Lecture Notes in Computer Science, page 19-33. Springer, (1996)Automatic Abstraction in SMT-Based Unbounded Software Model Checking., , , and . CAV, volume 8044 of Lecture Notes in Computer Science, page 846-862. Springer, (2013)Model Checking: Software and Beyond., and . J. Univers. Comput. Sci., 13 (5): 639-649 (2007)Verifying security protocols with Brutus., , and . ACM Trans. Softw. Eng. Methodol., 9 (4): 443-487 (2000)