Author of the publication

Reuse of Specification Patterns with the B Method.

, , and . ZB, volume 2651 of Lecture Notes in Computer Science, page 40-57. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proofs you can believe in: proving equivalences between Prolog semantics in Coq., , and . PPDP, page 37-48. ACM, (2013)Formal Verification of a Constant-Time Preserving C Compiler., , , , , , and . IACR Cryptology ePrint Archive, (2019)Selected Extended Papers of VSTTE 2016., and . J. Autom. Reason., 60 (3): 255-256 (2018)Formally verified speculation and deoptimization in a JIT compiler., , , , and . Proc. ACM Program. Lang., 5 (POPL): 1-26 (2021)Formal verification of a constant-time preserving C compiler., , , , , , and . Proc. ACM Program. Lang., 4 (POPL): 7:1-7:30 (2020)A Formally Verified WCET Estimation Tool., , , and . WCET, volume 39 of OASIcs, page 11-20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2014)Software maintenance: an analysis of industrial needs and constraints., , , , and . ICSM, page 18-26. IEEE Computer Society, (1992)From Verified Compilation to Secure Compilation: a Semantic Approach.. PLAS@CCS, page 1. ACM, (2020)From Mechanized Semantics to Verified Compilation: the Clight Semantics of CompCert.. FASE, volume 14573 of Lecture Notes in Computer Science, page 1-21. Springer, (2024)Chronique : Comment gagner la confiance en C?. Technique et Science Informatiques, 26 (9): 1195-1200 (2007)