Author of the publication

Weakest Precondition Inference for Non-Deterministic Linear Array Programs.

, , , , and . TACAS (2), volume 14571 of Lecture Notes in Computer Science, page 175-195. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scaling up Model-checking, , , and . (2007)Cooperative and Non-Cooperative Control in IEEE 802.11 WLANs, , , and . page 1663-1672. (2005)Proving unreachability using bounded model checking., , and . ISEC, page 73-82. ACM, (2010)Feature based Structuring and Composing of SDLC Artifacts., , , and . SEKE, page 583-586. Knowledge Systems Institute Graduate School, (2010)Optimal Bundling of Technological Products with Network Externality., , and . Manag. Sci., 56 (12): 2224-2236 (2010)Achieving Effective Test Suites for Reactive Systems using Specification Mining and Test Suite Reduction Techniques., , and . ACM SIGSOFT Softw. Eng. Notes, 40 (1): 1-8 (2015)VeriFuzz: Program Aware Fuzzing - (Competition Contribution)., , and . TACAS (3), volume 11429 of Lecture Notes in Computer Science, page 244-249. Springer, (2019)VeriAbs : Verification by Abstraction and Test Generation (Competition Contribution)., , , , , , , , , and . TACAS (2), volume 12079 of Lecture Notes in Computer Science, page 383-387. Springer, (2020)Formal Techniques for Analysing Scenarios using Message Sequence Charts., , and . VISS@ETAPS, volume 65 of Electronic Notes in Theoretical Computer Science, page 1-17. Elsevier, (2002)Over-approximating loops to prove properties using bounded model checking., , , , and . DATE, page 1407-1412. ACM, (2015)