Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

2/3 Alternating Simulation Between Interface Automata., , and . ICFEM, volume 3785 of Lecture Notes in Computer Science, page 173-187. Springer, (2005)Analysis and Remodeling of the DirtyCOW Vulnerability by Debugging and Abstraction., and . SOFL+MSVL, volume 12028 of Lecture Notes in Computer Science, page 3-12. Springer, (2019)Bridging Refinement of Interface Automata to Forward Simulation of I/O Automata., , and . ICFEM, volume 3308 of Lecture Notes in Computer Science, page 259-273. Springer, (2004)More efficient automatic repair of large-scale programs using weak recompilation., , , , and . Sci. China Inf. Sci., 55 (12): 2785-2799 (2012)Analyzing Math Library Functions via Summarization., , , , and . QRS Companion, page 259-264. IEEE, (2016)基于语义补丁的Linux驱动程序后向移植技术 (Backporting of Linux Device Drivers Using Semantic Patch)., , and . 计算机科学, 44 (11): 64-68 (2017)Reverse Observation Equivalence Between Labelled State Transition Systems., , and . ICTAC, volume 3407 of Lecture Notes in Computer Science, page 204-219. Springer, (2004)Data Race Detection for Interrupt-Driven Programs via Bounded Model Checking., , , , and . SERE (Companion), page 204-210. IEEE, (2013)