Author of the publication

Decidable Synthesis of Programs with Uninterpreted Functions.

, , , , and . CAV (2), volume 12225 of Lecture Notes in Computer Science, page 634-657. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A formal framework for reflective database access control policies., , and . ACM Conference on Computer and Communications Security, page 289-298. ACM, (2008)Decidable Verification of Uninterpreted Programs., , and . CoRR, (2018)Timed Control Synthesis for External Specifications., and . STACS, volume 2285 of Lecture Notes in Computer Science, page 571-582. Springer, (2002)Visibly pushdown languages., and . STOC, page 202-211. ACM, (2004)An Infinite Automaton Characterization of Double Exponential Time., , and . CSL, volume 5213 of Lecture Notes in Computer Science, page 33-48. Springer, (2008)Vetting browser extensions for security vulnerabilities with VEX., , , , , and . Commun. ACM, 54 (9): 91-99 (2011)A Learning-Based Approach to Synthesizing Invariants for Incomplete Verification Engines., , , , and . J. Autom. Reason., 64 (7): 1523-1552 (2020)Learning stateful preconditions modulo a test generator., , , , and . PLDI, page 775-787. ACM, (2019)Predicting null-pointer dereferences in concurrent programs., , , and . SIGSOFT FSE, page 47. ACM, (2012)Causal Dataflow Analysis for Concurrent Programs., and . TACAS, volume 4424 of Lecture Notes in Computer Science, page 102-116. Springer, (2007)