Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tree Interpolation in Vampire., , , and . LPAR, volume 8312 of Lecture Notes in Computer Science, page 173-181. Springer, (2013)Faster Algorithms for Weighted Recursive State Machines., , , and . ESOP, volume 10201 of Lecture Notes in Computer Science, page 287-313. Springer, (2017)Inductive sequentialization of asynchronous programs., , , , and . PLDI, page 227-242. ACM, (2020)Monitoring Event Frequencies., , and . CoRR, (2019)Using Lightweight Formal Methods to Validate a Key-Value Storage Node in Amazon S3., , , , , , , , , and 2 other author(s). SOSP, page 836-850. ACM, (2021)Refinement for Structured Concurrent Programs., , and . CAV (1), volume 12224 of Lecture Notes in Computer Science, page 275-298. Springer, (2020)Monitoring Event Frequencies., , and . CSL, volume 152 of LIPIcs, page 20:1-20:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Verifikation Nebenläufiger Programme.. Ausgezeichnete Informatikdissertationen, volume D-21 of LNI, GI, (2020)The Civl Verifier., and . FMCAD, page 143-152. IEEE, (2021)Extensional Crisis and Proving Identity., , , and . ATVA, volume 8837 of Lecture Notes in Computer Science, page 185-200. Springer, (2014)