Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Toolset for Modelling and Verification of GALS Systems., , , , and . CAV, volume 3114 of Lecture Notes in Computer Science, page 506-509. Springer, (2004)Generalizing Simulation to Abstract Domains.. CONCUR, volume 8052 of Lecture Notes in Computer Science, page 485-499. Springer, (2013)Büchi, Lindenbaum, Tarski: A Program Analysis Appetizer., and . IJCAI, page 4150-4154. IJCAI/AAAI Press, (2016)Existential abstractions for distributed reactive systems via syntactic transformations., , and . EMSOFT, page 240-248. ACM, (2007)Bridge Over Troubled Wrappers: Automated Interface Synthesis., , and . VLSI Design, page 189-194. IEEE Computer Society, (2004)Abstract Interpretation as Automated Deduction., and . CADE, volume 9195 of Lecture Notes in Computer Science, page 450-464. Springer, (2015)Propositional Interpolation and Abstract Interpretation.. ESOP, volume 6012 of Lecture Notes in Computer Science, page 185-204. Springer, (2010)Contextual Policy Enforcement in Android Applications with Permission Event Graphs., , , , , , , , and . NDSS, The Internet Society, (2013)The Correctness-Security Gap in Compiler Optimization., , and . IEEE Symposium on Security and Privacy Workshops, page 73-87. IEEE Computer Society, (2015)Synchronous Protocol Automata: A Framework for Modelling and Verification of SoC Communication Architectures., , and . DATE, page 390-395. IEEE Computer Society, (2004)