Author of the publication

A randomized satisfiability procedure for arithmetic and uninterpreted function symbols.

, and . Inf. Comput., 199 (1-2): 107-131 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CONCURRIT: Testing Concurrent Programs with Programmable State-Space Exploration., , , and . HotPar, USENIX Association, (2012)Using Dependent Types to Certify the Safety of Assembly Code., and . SAS, volume 3672 of Lecture Notes in Computer Science, page 155-170. Springer, (2005)Data Structure Specifications via Local Equality Axioms., and . CAV, volume 3576 of Lecture Notes in Computer Science, page 476-490. Springer, (2005)Temporal-Safety Proofs for Systems Code., , , , , and . CAV, volume 2404 of Lecture Notes in Computer Science, page 526-538. Springer, (2002)Safe, Untrusted Agents Using Proof-Carrying Code., and . Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, page 61-91. Springer, (1998)Global value numbering using random interpretation., and . POPL, page 342-352. ACM, (2004)Discovering affine equalities using random interpretation., and . POPL, page 74-84. ACM, (2003)ACM SIGPLAN Notices 38(1), January 2003.CCured: type-safe retrofitting of legacy code., , and . POPL, page 128-139. ACM, (2002)ACM SIGPLAN Notices 37(1), January 2002.Enforcing Resource Bounds via Static Verification of Dynamic Checks., , , , and . ESOP, volume 3444 of Lecture Notes in Computer Science, page 311-325. Springer, (2005)The open verifier framework for foundational verifiers., , , and . TLDI, page 1-12. ACM, (2005)