Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-armed Bandits for Boolean Connectives in Hybrid System Falsification., , and . CAV (1), volume 11561 of Lecture Notes in Computer Science, page 401-420. Springer, (2019)Categorical Büchi and Parity Conditions via Alternating Fixed Points of Functors., and . CMCS, volume 11202 of Lecture Notes in Computer Science, page 214-234. Springer, (2018)Probabilistic Anonymity Via Coalgebraic Simulations., and . ESOP, volume 4421 of Lecture Notes in Computer Science, page 379-394. Springer, (2007)Coinduction for Computation Structures and Programming Languages (NII Shonan Meeting 2013-11)., , and . NII Shonan Meet. Rep., (2013)Tail Probabilities for Randomized Program Runtimes via Martingales for Higher Moments., , and . CoRR, (2018)Categorical semantics for arrows., , and . J. Funct. Program., 19 (3-4): 403-438 (2009)Decision Tree Learning in CEGIS-Based Termination Analysis., , and . CAV (2), volume 12760 of Lecture Notes in Computer Science, page 75-98. Springer, (2021)Abstract Interpretation with Infinitesimals: Towards Scalability in Nonstandard Static Analysis., , and . SNR@CAV, volume 37 of EPiC Series in Computing, page 11-22. EasyChair, (2015)Dynamic Shielding for Reinforcement Learning in Black-Box Environments., , , , , and . ATVA, volume 13505 of Lecture Notes in Computer Science, page 25-41. Springer, (2022)Exemplifying Parametric Timed Specifications over Signals with Bounded Behavior., , , and . NFM, volume 13260 of Lecture Notes in Computer Science, page 470-488. Springer, (2022)