Author of the publication

A Symbolic Approach to Safety ltl Synthesis.

, , , , and . Haifa Verification Conference, volume 10629 of Lecture Notes in Computer Science, page 147-162. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatically Testing Web Services Choreography with Assertions., , , , , and . ICFEM, volume 6447 of Lecture Notes in Computer Science, page 138-154. Springer, (2010)Efficient Resource Constrained Scheduling Using Parallel Two-Phase Branch-and-Bound Heuristics., , , , and . IEEE Trans. Parallel Distributed Syst., 28 (5): 1299-1314 (2017)Exploring optimal solution to hardware/software partitioning for synchronous model., , , , and . Formal Aspects Comput., 17 (4): 443-460 (2005)Bound-oriented parallel pruning approaches for efficient resource constrained scheduling of high-level synthesis., , , and . CODES+ISSS, page 14:1-14:10. IEEE, (2013)Constraint Checking for XML-Based Language Specification by SAT Solver., , , and . SSIRI (Companion), page 26-27. IEEE Computer Society, (2010)A Symbolic Approach to Safety ltl Synthesis., , , , and . Haifa Verification Conference, volume 10629 of Lecture Notes in Computer Science, page 147-162. Springer, (2017)SAT-Based Explicit LTL Reasoning., , , and . Haifa Verification Conference, volume 9434 of Lecture Notes in Computer Science, page 209-224. Springer, (2015)A Formal Model forWeb Service Choreography Description Language (WS-CDL)., , , , and . ICWS, page 893-894. IEEE Computer Society, (2006)AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning., , , , , , and . ACM Multimedia, page 395-403. ACM, (2021)SPARDL: A Requirement Modeling Language for Periodic Control System., , , , , , and . ISoLA (1), volume 6415 of Lecture Notes in Computer Science, page 594-608. Springer, (2010)