Author of the publication

Constraint-Based Contract Inference for Deductive Verification.

, , , and . 20 Years of KeY, volume 12345 of Lecture Notes in Computer Science, Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic analysis of DMA races using model checking and k-induction., , and . Formal Methods Syst. Des., 39 (1): 83-113 (2011)Ranking function synthesis for bit-vector relations., , , and . Formal Methods Syst. Des., 43 (1): 93-120 (2013)Beyond Quantifier-Free Interpolation in Extensions of Presburger Arithmetic (Extended Technical Report), , , and . CoRR, (2010)Construction of Proofs.. The KeY Approach, volume 4334 of Lecture Notes in Computer Science, Springer, (2007)A Decision Procedure for Path Feasibility of String Manipulating Programs with Integer Data Type., , , , , , and . ATVA, volume 12302 of Lecture Notes in Computer Science, page 325-342. Springer, (2020)Automatic Analysis of Scratch-Pad Memory Code for Heterogeneous Multicore Processors., , and . TACAS, volume 6015 of Lecture Notes in Computer Science, page 280-295. Springer, (2010)Characterization of Simulation by Probabilistic Testing., and . Theory and Practice of Formal Methods, volume 9660 of Lecture Notes in Computer Science, page 360-372. Springer, (2016)JayHorn: a Java model checker.. FTfJP@ECOOP, page 1:1. ACM, (2019)Competition Report: CHC-COMP-20.. VPT/HCVS@ETAPS, volume 320 of EPTCS, page 197-219. (2020)Automatic Program Instrumentation for Automatic Verification., , , , and . CAV (3), volume 13966 of Lecture Notes in Computer Science, page 281-304. Springer, (2023)