Author of the publication

Verifying safety properties of concurrent heap-manipulating programs.

, and . ACM Trans. Program. Lang. Syst., 32 (5): 18:1-18:50 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic automata for representing big code., , , and . Acta Inf., 53 (4): 327-356 (2016)code2seq: Generating Sequences from Structured Representations of Code., , and . CoRR, (2018)Programming Not Only by Example., , and . CoRR, (2017)Continuous code-quality assurance with SAFE., , and . PEPM, page 145-149. ACM, (2006)Synthesis of Forgiving Data Extractors., , and . WSDM, page 385-394. ACM, (2017)Abstraction-Guided Synthesis.. VMCAI, volume 7737 of Lecture Notes in Computer Science, page 27. Springer, (2013)Inferring Synchronization under Limited Observability., , and . TACAS, volume 5505 of Lecture Notes in Computer Science, page 139-154. Springer, (2009)Establishing Local Temporal Heap Safety Properties with Applications to Compile-Time Memory Management., , , and . SAS, volume 2694 of Lecture Notes in Computer Science, page 483-503. Springer, (2003)Automatic Synthesis of Deterministic Concurrency., , and . SAS, volume 7935 of Lecture Notes in Computer Science, page 283-303. Springer, (2013)Automatic Verification of Determinism for Structured Parallel Programs., , , and . SAS, volume 6337 of Lecture Notes in Computer Science, page 455-471. Springer, (2010)