Author of the publication

Collaborative Verification of Uninterpreted Programs.

, , , and . TASE, volume 13299 of Lecture Notes in Computer Science, page 148-154. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduling jobs with chain precedence constraints and deteriorating jobs., , and . J. Oper. Res. Soc., 62 (9): 1765-1770 (2011)Modelling and model checking suspendible business processes via statechart diagrams and CSP, , , and . Science of Computer Programming, 65 (1): 14--29 (March 2007)A topology-aware method for scientific application deployment on cloud., , , , and . IJWGS, 10 (4): 338-370 (2014)On the Design of Hybrid Control Systems Using Automata Models., and . FSTTCS, volume 1180 of Lecture Notes in Computer Science, page 156-167. Springer, (1996)Joint Optimization of Stateful VNF Placement and Routing Scheduling in Software-Defined Networks., , , , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 9-14. IEEE, (2018)Deep Learning-based Transformation Matrix Estimation for Bidirectional Interframe Prediction., , and . GCCE, page 726-730. IEEE, (2018)Compositional Verification of UML Dynamic Models., , , and . APSEC, page 286-293. IEEE Computer Society, (2007)Modular Heap Abstraction-Based Code Clone Detection for Heap-Manipulating Programs., , and . QSIC, page 197-200. IEEE, (2012)Counterexample-Preserving Reduction for Symbolic Model Checking., , , , , and . J. Appl. Math., (2014)SEdroid: A Robust Android Malware Detector using Selective Ensemble Learning., , , and . WCNC, page 1-5. IEEE, (2020)