Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Cooperating Decision Procedures., , and . CADE, volume 1831 of Lecture Notes in Computer Science, page 79-98. Springer, (2000)Politeness for the Theory of Algebraic Datatypes., , , , , and . IJCAR (1), volume 12166 of Lecture Notes in Computer Science, page 238-255. Springer, (2020)Gap-free Processor Verification by S2QED and Property Generation., , , , , , , and . DATE, page 526-531. IEEE, (2020)Witness Runs for Counter Machines., , and . FroCos, volume 8152 of Lecture Notes in Computer Science, page 120-150. Springer, (2013)Towards Proving the Adversarial Robustness of Deep Neural Networks., , , , and . FVAV@iFM, volume 257 of EPTCS, page 19-26. (2017)Solving Quantified Verification Conditions Using Satisfiability Modulo Theories., , and . CADE, volume 4603 of Lecture Notes in Computer Science, page 167-182. Springer, (2007)PEak: A Single Source of Truth for Hardware Design and Verification., , , , , , and . CoRR, (2023)Tighter Abstract Queries in Neural Network Verification., , , and . CoRR, (2022)lazybvtoint at the SMT Competition 2020., , , , , and . CoRR, (2021)Toward Certified Robustness Against Real-World Distribution Shifts., , , , , , , , and . CoRR, (2022)