Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Pre/Post Specifications for Heap-Manipulating Methods., , , and . HASE, page 357-364. IEEE Computer Society, (2007)Hierarchical Reinforcement Learning Under Mixed Observability., , , , , and . WAFR, volume 25 of Springer Proceedings in Advanced Robotics, page 188-204. Springer, (2022)Enhancing Program Verification with Lemmas., and . CAV, volume 5123 of Lecture Notes in Computer Science, page 355-369. Springer, (2008)An Ensemble Learning Approach for Credit Scoring Problem: A Case Study of Taiwan Default Credit Card Dataset., , , and . MCO, volume 363 of Lecture Notes in Networks and Systems, page 283-292. Springer, (2021)Automated verification of shape, size and bag properties via user-defined predicates in separation logic., , , and . Sci. Comput. Program., 77 (9): 1006-1036 (2012)Analysing memory resource bounds for low-level programs., , , and . ISMM, page 151-160. ACM, (2008)Verifying safety policies with size properties and alias controls., , , , and . ICSE, page 186-195. ACM, (2005)Detecting and eliminating memory leaks using cyclic memory allocation., and . ISMM, page 15-30. ACM, (2007)Automated Verification of Shape and Size Properties Via Separation Logic., , , and . VMCAI, volume 4349 of Lecture Notes in Computer Science, page 251-266. Springer, (2007)Leveraging Fully Observable Policies for Learning under Partial Observability., , , , and . CoRL, volume 205 of Proceedings of Machine Learning Research, page 1673-1683. PMLR, (2022)