Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of Operating System Errors., , , , and . SOSP, page 73-88. ACM, (2001)Operating System Review 35(5).The Evaluation of Two-Stage Mobile Learning Guidance of Math in an Elementary School., , , , and . WMUTE, page 282-286. IEEE Computer Society, (2012)Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code., , and . SOSP, page 57-72. ACM, (2001)Operating System Review 35(5).CMC: A Pragmatic Approach to Model Checking Real Code., , , , and . OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions., , , and . OSDI, page 1-16. USENIX Association, (2000)Interactive data Analysis: The Control Project., , , , , , , and . Computer, 32 (8): 51-59 (1999)Model checking system software with CMC., , , and . ACM SIGOPS European Workshop, page 219-222. ACM, (2002)A few billion lines of code later: using static analysis to find bugs in the real world., , , , , , , , , and . Commun. ACM, 53 (2): 66-75 (2010)A few billion lines of code later: using static analysis to find bugs in the real world, , , , , , , , , and . Communications of the ACM, 53 (2): 66-75 (2010)A simple method for extracting models for protocol code., , , and . ISCA, page 192-203. ACM, (2001)