Author of the publication

Leveraging DTrace for Runtime Verification.

, , and . RV, volume 10012 of Lecture Notes in Computer Science, page 318-332. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A type system for finding upper resource bounds of multi-threaded programs with nested transactions., , , and . SoICT, page 21-30. ACM, (2012)Orchestration of secure Web Services within an E-government Interoperability Platform., , , and . CLEI, page 1-12. IEEE, (2014)Ready, set, Go! Data-race detection and the Go language., and . CoRR, (2019)Automated modelling of signal transduction networks., , , , and . BMC Bioinform., (2002)Safe locking for multi-threaded Java with exceptions., , , and . J. Log. Algebraic Methods Program., 81 (3): 257-283 (2012)SAT modulo discrete event simulation applied to railway design capacity analysis., , , and . Formal Methods Syst. Des., 57 (2): 211-245 (2021)Lazy Behavioral Subtyping., , , and . FM, volume 5014 of Lecture Notes in Computer Science, page 52-67. Springer, (2008)Iterating Transducers., , and . CAV, volume 2102 of Lecture Notes in Computer Science, page 286-297. Springer, (2001)Safe Commits for Transactional Featherweight Java., and . IFM, volume 6396 of Lecture Notes in Computer Science, page 290-304. Springer, (2010)Higher-Order Subtyping., and . Theor. Comput. Sci., 176 (1-2): 235-282 (1997)Corrigendum: TCS 184(1-2): 247 (1997).