Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Checking roundoff errors using counterexample-guided narrowing., and . ASE, page 301-304. ACM, (2010)Nested Timed Automata with Frozen Clocks., , and . FORMATS, volume 9268 of Lecture Notes in Computer Science, page 189-205. Springer, (2015)Proving Properties of Incremental Merkle Trees., , and . CADE, volume 3632 of Lecture Notes in Computer Science, page 424-440. Springer, (2005)Subtropical Satisfiability., , , and . FroCoS, volume 10483 of Lecture Notes in Computer Science, page 189-206. Springer, (2017)Call-by-need reduction for membership conditional term rewriting Systems.. WRS, volume 86 of Electronic Notes in Theoretical Computer Science, page 673-688. Elsevier, (2003)Abstract Interpretation over Infinite Abstract Domains (Tentative Report).. APLAS, page 183-191. (2001)Complete Axiomatization of an Algebraic Construction of Graphs.. FLOPS, volume 2998 of Lecture Notes in Computer Science, page 163-179. Springer, (2004)Low level code analysis and applications to computer security (NII Shonan Meeting 2015-4)., , and . NII Shonan Meet. Rep., (2015)On the determinization of event-clock input-driven pushdown automata., and . CoRR, (2021)Automatic Stub Generation for Dynamic Symbolic Execution of ARM binary., and . SoICT, page 352-359. ACM, (2022)