From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How testable is business software?. FMCAD, стр. 1. IEEE, (2020)2LS: Heap Analysis and Memory Safety (Competition Contribution)., , , и . CoRR, (2019)Template-Based Verification of Heap-Manipulating Programs., , , и . FMCAD, стр. 1-9. IEEE, (2018)Unbounded-Time Safety Verification of Guarded LTI Models with Inputs by Abstract Acceleration., , , и . J. Autom. Reason., 65 (2): 157-203 (2021)BlueCov: Integrating Test Coverage and Model Checking with JBMC., и . SAC, стр. 1695-1697. ACM, (2023)2LS: Heap Analysis and Memory Safety - (Competition Contribution)., , и . TACAS (2), том 12079 из Lecture Notes in Computer Science, стр. 368-372. Springer, (2020)2LS: Arrays and Loop Unwinding - (Competition Contribution)., , , и . TACAS (2), том 13994 из Lecture Notes in Computer Science, стр. 529-534. Springer, (2023)JBMC: A Bounded Model Checking Tool for Java Bytecode., , , и . CoRR, (2023)Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration., , , и . SAS, том 9291 из Lecture Notes in Computer Science, стр. 312-331. Springer, (2015)Safety Verification and Refutation by k-Invariants and k-Induction., , , и . SAS, том 9291 из Lecture Notes in Computer Science, стр. 145-161. Springer, (2015)