Author of the publication

An Approach for Automatically Generating Traces for Python Programs.

, , and . DSA, page 262-268. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decidability of Propositional Projection Temporal Logic with Infinite Models., and . TAMC, volume 4484 of Lecture Notes in Computer Science, page 521-532. Springer, (2007)Unified temporal logic., , and . Theor. Comput. Sci., (2021)An Approach for Automatically Generating Traces for Python Programs., , and . DSA, page 262-268. IEEE, (2022)An Approach to Agent Path Planning Under Temporal Logic Constraints., , , and . COCOON (2), volume 14423 of Lecture Notes in Computer Science, page 82-93. Springer, (2023)A dynamic approach to detecting, eliminating and fixing memory leaks., , , , and . J. Comb. Optim., 42 (3): 409-426 (2021)Detecting Atomicity Violations in Interrupt-Driven Programs via Interruption Points Selecting and Delayed ISR-Triggering., , , , , , , , , and . ESEC/SIGSOFT FSE, page 1153-1164. ACM, (2023)Multi-keyword ranked search with access control for multiple data owners in the cloud., , , , and . J. Inf. Secur. Appl., (2024)RTPDroid: Detecting Implicitly Malicious Behaviors Under Runtime Permission Model., , , and . QRS, page 121. IEEE, (2020)Model Checking μ C/OS-III Multi-task System with TMSVL., , , , and . ICFEM, volume 9407 of Lecture Notes in Computer Science, page 187-200. Springer, (2015)USV Path Planning Based on Adaptive Fuzzy Reward., , , and . IJCRS, volume 13633 of Lecture Notes in Computer Science, page 117-131. Springer, (2022)