From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A context-sensitive structural heuristic for guided search model checking., и . ASE, стр. 410-413. ACM, (2005)Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization (Extended Version)., , , , , , , , , и 5 other автор(ы). CoRR, (2024)Testing Dafny (experience paper)., , , , и . ISSTA, стр. 556-567. ACM, (2022)Hardness for Explicit State Software Model Checking Benchmarks., и . SEFM, стр. 247-256. IEEE Computer Society, (2007)Helping system engineers bridge the peaks., , , , , , и . TwinPeaks, стр. 9-13. ACM, (2014)Block public access: trust safety verification of access control policies., , , , , , , , , и 4 other автор(ы). ESEC/SIGSOFT FSE, стр. 281-291. ACM, (2020)Symbolic execution with mixed concrete-symbolic solving., , и . ISSTA, стр. 34-44. ACM, (2011)Symbolically modeling concurrent MCAPI executions., , и . PPoPP, стр. 307-308. ACM, (2011)An Improved Distance Heuristic Function for Directed Software Model Checking., и . FMCAD, стр. 60-67. IEEE Computer Society, (2006)Symbolic PathFinder: symbolic execution of Java bytecode., и . ASE, стр. 179-180. ACM, (2010)