Author of the publication

Software Verification for Weak Memory via Program Transformation.

, , , and . ESOP, volume 7792 of Lecture Notes in Computer Science, page 512-532. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error explanation with distance metrics., , , and . Int. J. Softw. Tools Technol. Transf., 8 (3): 229-247 (2006)An Interpolating Sequent Calculus for Quantifier-Free Presburger Arithmetic., , , and . J. Autom. Reason., 47 (4): 341-367 (2011)Towards a Classification of Hamiltonian Cycles in the 6-Cube., and . J. Satisf. Boolean Model. Comput., 4 (1): 57-74 (2008)Ranking Policy Decisions., , , and . CoRR, (2020)Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters., , and . ACM Conference on Computer and Communications Security, page 1689-1706. ACM, (2019)Beyond Quantifier-Free Interpolation in Extensions of Presburger Arithmetic., , , and . VMCAI, volume 6538 of Lecture Notes in Computer Science, page 88-102. Springer, (2011)CBMC - C Bounded Model Checker - (Competition Contribution)., and . TACAS, volume 8413 of Lecture Notes in Computer Science, page 389-391. Springer, (2014)A Tool for Checking ANSI-C Programs., , and . TACAS, volume 2988 of Lecture Notes in Computer Science, page 168-176. Springer, (2004)Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs., , , and . FM, volume 8442 of Lecture Notes in Computer Science, page 263-278. Springer, (2014)Decision Procedures - An Algorithmic Point of View, and . Texts in Theoretical Computer Science. An EATCS Series Springer, (2008)