Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mediating for Reduction (on Minimizing Alternating Büchi Automata)., , , and . FSTTCS, volume 4 of LIPIcs, page 1-12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2009)Counterexample Validation and Interpolation-Based Refinement for Forest Automata., , , , and . VMCAI, volume 10145 of Lecture Notes in Computer Science, page 288-309. Springer, (2017)Composed Bisimulation for Tree Automata., , , , and . CIAA, volume 5148 of Lecture Notes in Computer Science, page 212-222. Springer, (2008)Regex matching with counting-set automata., , , , , and . Proc. ACM Program. Lang., 4 (OOPSLA): 218:1-218:30 (2020)Low-Level Bi-Abduction., , , , , and . ECOOP, volume 222 of LIPIcs, page 19:1-19:30. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers., , , , , and . USENIX Security Symposium, page 4165-4182. USENIX Association, (2022)Verification of Heap Manipulating Programs with Ordered Data by Extended Forest Automata., , , , , and . ATVA, volume 8172 of Lecture Notes in Computer Science, page 224-239. Springer, (2013)Simulation Algorithms for Symbolic Automata., , , , and . ATVA, volume 11138 of Lecture Notes in Computer Science, page 109-125. Springer, (2018)Approximate reduction of finite automata for high-speed network intrusion detection., , , , and . Int. J. Softw. Tools Technol. Transf., 22 (5): 523-539 (2020)From Low-Level Pointers to High-Level Containers., , , , and . VMCAI, volume 9583 of Lecture Notes in Computer Science, page 431-452. Springer, (2016)