From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Understanding Programming Bugs in ANSI-C Software Using Bounded Model Checking Counter-Examples., , , и . IFM, том 7321 из Lecture Notes in Computer Science, стр. 128-142. Springer, (2012)Towards a model-driven engineering approach for developing embedded hard real-time software., , и . SAC, стр. 308-314. ACM, (2008)Hunting Memory Bugs in C Programs with Map2Check - (Competition Contribution)., , и . TACAS, том 9636 из Lecture Notes in Computer Science, стр. 934-937. Springer, (2016)Counterexample Guided Inductive Optimization Applied to Mobile Robots Path Planning (Extended Version)., , , , и . CoRR, (2017)Bounded Model Checking of Software Using Interval Methods via Contractors., , , , и . CoRR, (2020)LF-checker: Machine Learning Acceleration of Bounded Model Checking for Concurrency Verification (Competition Contribution)., , , , и . CoRR, (2023)Boost the Impact of Continuous Formal Verification in Industry., , и . CoRR, (2019)CEG4N: Counter-Example Guided Neural Network Quantization Refinement., , , , и . NSV/FoMLAS@CAV, том 13466 из Lecture Notes in Computer Science, стр. 29-45. Springer, (2022)Evaluation of Ginga's CC-Web-Service Module., , , и . ICCE-Taiwan, стр. 697-698. IEEE, (2023)Verifying Security Vulnerabilities for Blockchain-based Smart Contracts., и . SBESC, стр. 1-8. IEEE, (2021)