Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Automata-Theoretic Approach to Protocol Verification (Abstract).. Concurrency, volume 335 of Lecture Notes in Computer Science, page 73. Springer, (1988)The Complexity of Set Constraints., , , and . CSL, volume 832 of Lecture Notes in Computer Science, page 1-17. Springer, (1993)Intersection and Rotation of Assumption Literals Boosts Bug-Finding., , , , and . VSTTE, volume 12031 of Lecture Notes in Computer Science, page 180-192. Springer, (2019)Coverage metrics for formal verification., , and . Int. J. Softw. Tools Technol. Transf., 8 (4-5): 373-386 (2006)Module Checking Revisited., and . CAV, volume 1254 of Lecture Notes in Computer Science, page 36-47. Springer, (1997)Node Selection Query Languages for Trees., , , and . CoRR, (2015)SAT-based Explicit LTLf Satisfiability Checking., , , , and . CoRR, (2018)Factored boolean functional synthesis., and . FMCAD, page 124-131. IEEE, (2017)Divination by program committee.. Commun. ACM, 60 (9): 7 (2017)Is information technology destroying the middle class?. Commun. ACM, 58 (2): 5 (2015)