From post

Propositional Reasoning about Safety and Termination of Heap-Manipulating Programs.

, , и . ESOP, том 9032 из Lecture Notes in Computer Science, стр. 661-684. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Accurate Theorem Proving for Program Verification., , и . ISoLA, том 4313 из Lecture Notes in Computer Science, стр. 96-114. Springer, (2004)Verifying C++ with STL containers via predicate abstraction., , и . ASE, стр. 521-524. ACM, (2007)Race analysis for systemc using model checking., и . ACM Trans. Design Autom. Electr. Syst., 15 (3): 21:1-21:32 (2010)Beyond Quantifier-Free Interpolation in Extensions of Presburger Arithmetic., , , и . VMCAI, том 6538 из Lecture Notes in Computer Science, стр. 88-102. Springer, (2011)A Tool for Checking ANSI-C Programs., , и . TACAS, том 2988 из Lecture Notes in Computer Science, стр. 168-176. Springer, (2004)CBMC - C Bounded Model Checker - (Competition Contribution)., и . TACAS, том 8413 из Lecture Notes in Computer Science, стр. 389-391. Springer, (2014)On Partial Order Semantics for SAT/SMT-Based Symbolic Encodings of Weak Memory Concurrency., и . FORTE, том 9039 из Lecture Notes in Computer Science, стр. 19-34. Springer, (2015)Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs., , , и . FM, том 8442 из Lecture Notes in Computer Science, стр. 263-278. Springer, (2014)Towards a Classification of Hamiltonian Cycles in the 6-Cube., и . J. Satisf. Boolean Model. Comput., 4 (1): 57-74 (2008)Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters., , и . ACM Conference on Computer and Communications Security, стр. 1689-1706. ACM, (2019)