Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transforming the Theorem Prover into a Digital Design Tool: From Concept Car to Off-Road Vehicle., , and . CAV, volume 1427 of Lecture Notes in Computer Science, page 39-44. Springer, (1998)Formal Synthesis of Filter Components for Use in Security-Enhancing Architectural Transformations., and . SP (Workshops), page 111-120. IEEE, (2021)Synthesizing Verified Components for Cyber Assured Systems Engineering., , , , , and . MoDELS, page 205-215. IEEE, (2021)The Specification, Verification, and Implementation of a High-Assurance Data Structure: An ACL2 Approach.. HICSS, page 5059-5067. IEEE Computer Society, (2013)Synthesis of Verified Architectural Components for Critical Systems Hosted on a Verified Microkernel.. HICSS, page 1-10. ScholarSpace, (2020)Using ACL2 in the Design of Efficient, Verifiable Data Structures for High-Assurance Systems., and . ACL2, volume 280 of EPTCS, page 61-76. (2018)A robust machine code proof framework for highly secure applications., , and . ACL2, page 11-20. ACM, (2006)Bakar Kiasan: Flexible Contract Checking for Critical Systems Using Symbolic Execution., , , , , and . NASA Formal Methods, volume 6617 of Lecture Notes in Computer Science, page 58-72. Springer, (2011)Integrated Contract-Based Unit and System Testing for Component-Based Systems., , , and . NFM, volume 14627 of Lecture Notes in Computer Science, page 406-426. Springer, (2024)Verification of a Rust Implementation of Knuth's Dancing Links using ACL2.. ACL2, volume 393 of EPTCS, page 161-174. (2023)