Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Putting the tools to work: how to succeed with source code analysis., , and . IEEE Secur. Priv., 4 (3): 80-83 (2006)Improving Computer Security Using Extended Static Checking.. S&P, page 160-173. IEEE Computer Society, (2002)Accounting for the unexpected: fault diagnosis out of the ivory tower.. ITC, page 1135. IEEE Computer Society, (1998)Creating small fault dictionaries logic circuit fault diagnosis., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 18 (3): 346-356 (1999)Generating Test Patterns for Bridge Faults in CMOS ICs., and . EDAC-ETC-EUROASIC, page 165-170. IEEE Computer Society, (1994)Prioritizing static analysis results., and . Datenschutz und Datensicherheit, 34 (3): 156-159 (2010)Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors., , and . IEEE Secur. Priv., 3 (6): 81-84 (2005)Static Analysis in Motion., , , , , and . IEEE Secur. Priv., 10 (3): 53-56 (2012)Diagnosing realistic bridging faults with single stuck-at information., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 17 (3): 255-268 (1998)On applying non-classical defect models to automated diagnosis., , , , , , and . ITC, page 748-757. IEEE Computer Society, (1998)