Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Loopy: Programmable and Formally Verified Loop Transformations., and . SAS, volume 9837 of Lecture Notes in Computer Science, page 383-402. Springer, (2016)Alternate and Learn: Finding Witnesses without Looking All over., , , and . CAV, volume 7358 of Lecture Notes in Computer Science, page 599-615. Springer, (2012)GPUDrano: Detecting Uncoalesced Accesses in GPU Programs., , , and . CAV (1), volume 10426 of Lecture Notes in Computer Science, page 507-525. Springer, (2017)Automating test automation., , , and . ICSE, page 881-891. IEEE Computer Society, (2012)Static detection of uncoalesced accesses in GPU programs., , , and . Formal Methods Syst. Des., 60 (1): 1-32 (February 2022)Precise piecewise affine models from input-output data., and . EMSOFT, page 3:1-3:10. ACM, (2014)Efficient and flexible GUI test execution via test merging., , , and . ISSTA, page 34-44. ACM, (2013)Hedging Bets in Markov Decision Processes., , , and . CSL, volume 62 of LIPIcs, page 29:1-29:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)Efficiently scripting change-resilient tests., , , , , , and . SIGSOFT FSE, page 41. ACM, (2012)Block-Size Independence for GPU Programs., , and . SAS, volume 11002 of Lecture Notes in Computer Science, page 107-126. Springer, (2018)