Author of the publication

Counterexample Guided Abstraction Refinement Algorithm for Propositional Circumscription.

, , and . JELIA, volume 6341 of Lecture Notes in Computer Science, page 195-207. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strongest postcondition of unstructured programs., , , and . FTfJP@ECOOP, page 6:1-6:7. ACM, (2009)History-Register Automata, and . Logical Methods in Computer Science, (2016)On QBF Proofs and Preprocessing., , and . LPAR, volume 8312 of Lecture Notes in Computer Science, page 473-489. Springer, (2013)Runtime Verification Based on Register Automata., , , and . TACAS, volume 7795 of Lecture Notes in Computer Science, page 260-276. Springer, (2013)InfERL: scalable and extensible Erlang static analysis., , , , , , and . Erlang Workshop, page 33-39. ACM, (2022)How to Complete an Interactive Configuration Process?, , , and . SOFSEM, volume 5901 of Lecture Notes in Computer Science, page 528-539. Springer, (2010)Java generics are turing complete.. POPL, page 73-85. ACM, (2017)Abstraction refinement guided by a learnt probabilistic model., and . POPL, page 485-498. ACM, (2016)Counterexample Guided Abstraction Refinement Algorithm for Propositional Circumscription., , and . JELIA, volume 6341 of Lecture Notes in Computer Science, page 195-207. Springer, (2010)PrivacyCAT: Privacy-Aware Code Analysis at Scale., , , , , , , , , and 2 other author(s). ICSE-SEIP, page 106-117. ACM, (2024)