Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Vacuity for Branching Temporal Logic., and . ACM Trans. Comput. Log., 13 (1): 1:1-1:32 (2012)Exploiting resolution proofs to speed up LTL vacuity detection for BMC., , , and . Int. J. Softw. Tools Technol. Transf., 12 (5): 319-335 (2010)Combining predicate and numeric abstraction for software model checking., and . Int. J. Softw. Tools Technol. Transf., 12 (6): 409-427 (2010)Verifying Verified Code., , , , , and . ATVA, volume 12971 of Lecture Notes in Computer Science, page 187-202. Springer, (2021)Predictive Run-Time Verification of Discrete-Time Reachability Properties in Black-Box Systems Using Trace-Level Abstraction and Statistical Learning., , and . RV, volume 11237 of Lecture Notes in Computer Science, page 187-204. Springer, (2018)Fast Approximations of Quantifier Elimination., , , and . CAV (2), volume 13965 of Lecture Notes in Computer Science, page 64-86. Springer, (2023)Automated Discovery of Simulation Between Programs., , and . LPAR, volume 9450 of Lecture Notes in Computer Science, page 606-621. Springer, (2015)Model exploration with temporal logic query checking., , and . SIGSOFT FSE, page 139-148. ACM, (2002)Automated assume-guarantee reasoning for omega-regular systems and specifications., and . Innov. Syst. Softw. Eng., 7 (2): 131-139 (2011)Verifying verified code., , , , , and . Innov. Syst. Softw. Eng., 18 (3): 335-346 (2022)