Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic Memory with Pointers., and . ATVA, volume 8837 of Lecture Notes in Computer Science, page 380-395. Springer, (2014)Symbiotic: Synergy of Instrumentation, Slicing, and Symbolic Execution - (Competition Contribution)., , and . TACAS, volume 7795 of Lecture Notes in Computer Science, page 630-632. Springer, (2013)Abstracting path conditions., and . ISSTA, page 155-165. ACM, (2012)STANSE: Bug-finding Framework for C Programs, , and . CoRR, (2012)Abstracting Path Conditions for Effective Symbolic Execution. CoRR, (2011)Compact Symbolic Execution., , and . ATVA, volume 8172 of Lecture Notes in Computer Science, page 193-207. Springer, (2013)Checking Properties Described by State Machines: On Synergy of Instrumentation, Slicing, and Symbolic Execution., , and . FMICS, volume 7437 of Lecture Notes in Computer Science, page 207-221. Springer, (2012)Predator Shape Analysis Tool Suite., , , , , and . Haifa Verification Conference, volume 10028 of Lecture Notes in Computer Science, page 202-209. (2016)Abstracting Path Conditions, and . CoRR, (2011)Tighter Loop Bound Analysis., , and . ATVA, volume 9938 of Lecture Notes in Computer Science, page 512-527. (2016)