Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PECAN: A Deterministic Certified Defense Against Backdoor Attacks., , and . CoRR, (2023)Repairing Decision-Making Programs Under Uncertainty., , and . CAV (1), volume 10426 of Lecture Notes in Computer Science, page 181-200. Springer, (2017)Weighted Model Integration with Orthogonal Transformations., , and . IJCAI, page 4610-4616. ijcai.org, (2017)Automata modulo theories., and . Commun. ACM, 64 (5): 86-95 (2021)Symbolic WS1S., and . LPAR (short papers), volume 35 of EPiC Series in Computing, page 59-66. EasyChair, (2015)Automatic program inversion using symbolic transducers., and . PLDI, page 376-389. ACM, (2017)Synthesis of Fault-Tolerant Distributed Router Configurations., , and . SIGMETRICS (Abstracts), page 87-89. ACM, (2018)How Can Automatic Feedback Help Students Construct Automata?, , , , , and . ACM Trans. Comput. Hum. Interact., 22 (2): 9:1-9:24 (2015)Extended symbolic finite automata and transducers., and . Formal Methods Syst. Des., 47 (1): 93-119 (2015)Symbolic Register Automata., , , and . CAV (1), volume 11561 of Lecture Notes in Computer Science, page 3-21. Springer, (2019)