Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Layered Falsification of Hybrid Systems guided by Monte Carlo Tree Search., , , and . CoRR, (2018)Symbolic execution for a clash-free subset of ASMs., , , , and . Sci. Comput. Program., (2018)Simulating a Flash File System with CoreASM and Eclipse., , , , and . GI-Jahrestagung, volume P-192 of LNI, page 355. GI, (2011)LEGION: Best-First Concolic Testing., , , and . ASE, page 54-65. IEEE, (2020)Bridging Arrays and ADTs in Recursive Proofs., and . TACAS (2), volume 12652 of Lecture Notes in Computer Science, page 24-42. Springer, (2021)ARCH-COMP 2019 Category Report: Falsification., , , , , , , , and . ARCH@CPSIoTWeek, volume 61 of EPiC Series in Computing, page 129-140. EasyChair, (2019)Verification of B+ trees by integration of shape analysis and interactive theorem proving., , and . Softw. Syst. Model., 14 (1): 27-44 (2015)Incremental Vulnerability Detection via Back-Propagating Symbolic Execution of Insecurity Separation Logic., , and . CoRR, (2021)State Selection Algorithms and Their Impact on The Performance of Stateful Network Protocol Fuzzing., , , , and . CoRR, (2021)Deductive Verification via the Debug Adapter Protocol., , and . F-IDE@NFM, volume 338 of EPTCS, page 89-96. (2021)