Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unleashing the Power of Static Analysis.. SAS, volume 4134 of Lecture Notes in Computer Science, page 1-2. Springer, (2006)Formal Specifications on Industrial-Strength Code-From Myth to Reality.. CAV, volume 4144 of Lecture Notes in Computer Science, page 1. Springer, (2006)Symbolic path simulation in path-sensitive dataflow analysis., , and . PASTE, page 52-58. ACM, (2005)Software validation via scalable path-sensitive value flow analysis., , , and . ISSTA, page 12-22. ACM, (2004)Perracotta: mining temporal API rules from imperfect traces., , , , and . ICSE, page 282-291. ACM, (2006)Static Analysis of Large Programs: Some Experiences (Abstract of Invited Talk).. PEPM, page 1. ACM, (2000)Path-Sensitive Dataflow Analysis with Iterative Refinement., , and . SAS, volume 4134 of Lecture Notes in Computer Science, page 425-442. Springer, (2006)Righting Software., , , , , , , and . IEEE Softw., 21 (3): 92-100 (2004)Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis., , , , , , and . SAS, volume 2477 of Lecture Notes in Computer Science, page 230-246. Springer, (2002)Semantic Foundations of Binding Time Analysis for Imperative Programs., , and . PEPM, page 100-110. ACM Press, (1995)