From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Program analysis via satisfiability modulo path programs., , , и . POPL, стр. 71-82. ACM, (2010)Alternation for Termination., , , и . SAS, том 6337 из Lecture Notes in Computer Science, стр. 304-319. Springer, (2010)Property Verification Through the Symbolic Enumeration of Control Path Programs, , , и . (2009)Draft (2009), under submission. Please request srirams@nec-labs.com for a copy..Complexity verification using guided theorem enumeration., , и . POPL, стр. 639-652. ACM, (2017)Enforcing Unique Code Target Property for Control-Flow Integrity., , , , , , и . CCS, стр. 1470-1486. ACM, (2018)Program synthesis for interactive-security systems., , , и . Formal Methods Syst. Des., 51 (2): 362-394 (2017)Secure Programming via Visibly Pushdown Safety Games., , и . CAV, том 7358 из Lecture Notes in Computer Science, стр. 581-598. Springer, (2012)Validating Library Usage Interactively., , , и . CAV, том 8044 из Lecture Notes in Computer Science, стр. 796-812. Springer, (2013)Proving UNSAT in Zero Knowledge., , , , , и . CCS, стр. 2203-2217. ACM, (2022)Spreadsheet table transformations from examples., и . PLDI, стр. 317-328. ACM, (2011)