Author of the publication

Lazy TSO Reachability.

, , , and . FASE, volume 9033 of Lecture Notes in Computer Science, page 267-282. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Upward/Downward Closures of Petri Nets., , , and . MFCS, volume 83 of LIPIcs, page 49:1-49:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Munchausen Iteration., and . CoRR, (2016)Petri Net Reachability Graphs: Decidability Status of First Order Properties, , , and . Logical Methods in Computer Science, (2012)A Theory of Name Boundedness., , and . CONCUR, volume 8052 of Lecture Notes in Computer Science, page 182-196. Springer, (2013)Verifying and Optimizing Compact NUMA-Aware Locks on Weak Memory Models., , , , , , and . CoRR, (2021)Effect Summaries for Thread-Modular Analysis., , , and . CoRR, (2017)Sicherheit, Zuverlässigkeit, Korrektheit., and . GI-Jahrestagung, volume P-294 of LNI, page 455-456. GI, (2019)Summaries for Context-Free Games., , and . FSTTCS, volume 65 of LIPIcs, page 41:1-41:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)Dartagnan: Bounded Model Checking for Weak Memory Models (Competition Contribution)., , , and . TACAS (2), volume 12079 of Lecture Notes in Computer Science, page 378-382. Springer, (2020)Temporal Tracing of On-Chip Signals using Timeprints., , , , , and . DAC, page 186. ACM, (2019)