Author of the publication

String Constraints for Verification.

, , , , , , and . CAV, volume 8559 of Lecture Notes in Computer Science, page 150-166. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance enhancement for iterative data computing with in-memory concurrent processing., , , and . Concurr. Comput. Pract. Exp., (2020)Z3-Noodler: An Automata-based String Solver (Technical Report)., , , , , and . CoRR, (2023)GOAL: A Graphical Tool for Manipulating Büchi Automata and Temporal Formulae., , , , and . TACAS, volume 4424 of Lecture Notes in Computer Science, page 466-471. Springer, (2007)PyCT: A Python Concolic Tester., , , , and . APLAS, volume 13008 of Lecture Notes in Computer Science, page 38-46. Springer, (2021)Simulations in Rank-Based Büchi Automata Complementation., , and . APLAS, volume 11893 of Lecture Notes in Computer Science, page 447-467. Springer, (2019)Verifying Curve25519 Software., , , , , , , and . CCS, page 299-309. ACM, (2014)Learning Boolean Functions Incrementally., and . CAV, volume 7358 of Lecture Notes in Computer Science, page 55-70. Springer, (2012)Optimal sanitization synthesis for web application vulnerability repair., , , , , and . ISSTA, page 189-200. ACM, (2016)Learning Büchi Automata and Its Applications., , , and . SETSS, volume 11430 of Lecture Notes in Computer Science, page 38-98. Springer, (2018)Compare virtual reality and augmented reality systems for claustrophobia from HRV., , , and . ITST, page 155-159. IEEE, (2012)