Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification Condition Generation for Permission Logics with Abstract Predicates and Abstraction Functions., , , and . ECOOP, volume 7920 of Lecture Notes in Computer Science, page 451-476. Springer, (2013)Integrated Environment for Diagnosing Verification Errors., , , and . TACAS, volume 9636 of Lecture Notes in Computer Science, page 424-441. Springer, (2016)Constraint Semantics for Abstract Read Permissions., , , and . FTfJP@ECOOP, page 2:1-2:6. ACM, (2014)Using the RECOMS Architecture for Controlling a Radio Telescope, , , , and . Lehrstuhl für Realzeit--Computersysteme, Technische Universität München, (2004)Sound Verification of Security Protocols: From Design to Interoperable Implementations., , , , , , , and . SP, page 1077-1093. IEEE, (2023)Automatically testing implementations of numerical abstract domains., , , and . ASE, page 768-778. ACM, (2018)A general framework for dynamic stub injection., , , and . ICSE, page 586-596. IEEE / ACM, (2017)Serializability for eventual consistency: criterion, analysis, and applications., , , and . POPL, page 458-472. ACM, (2017)Permission Inference for Array Programs., , , , and . CAV (2), volume 10982 of Lecture Notes in Computer Science, page 55-74. Springer, (2018)Nagini: A Static Verifier for Python., and . CAV (1), volume 10981 of Lecture Notes in Computer Science, page 596-603. Springer, (2018)