Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lazy Sequentialization for the Safety Verification of Unbounded Concurrent Programs., , , and . ATVA, volume 9938 of Lecture Notes in Computer Science, page 174-191. (2016)Decidable logics combining heap structures and data., , and . POPL, page 611-622. ACM, (2011)The tree width of auxiliary storage., and . POPL, page 283-294. ACM, (2011)Verifying Programs by Bounded Tree-Width Behavior Graphs., , , and . EUMAS, volume 14282 of Lecture Notes in Computer Science, page 116-132. Springer, (2023)Security Analysis of Role-Based Access Control through Program Verification., , and . CSF, page 113-125. IEEE Computer Society, (2012)A Robust Class of Context-Sensitive Languages., , and . LICS, page 161-170. IEEE Computer Society, (2007)Scope-Bounded Pushdown Languages., , and . Int. J. Found. Comput. Sci., 27 (2): 215-234 (2016)Model-Checking Parameterized Concurrent Programs Using Linear Interfaces., , and . CAV, volume 6174 of Lecture Notes in Computer Science, page 629-644. Springer, (2010)A linear time algorithm for the minimum Weighted Feedback Vertex Set on diamonds., , , and . Inf. Process. Lett., 94 (1): 29-35 (2005)Fast payment schemes for truthful mechanisms with verification., , , and . Theor. Comput. Sci., 410 (8-10): 886-899 (2009)