Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A context-sensitive structural heuristic for guided search model checking., and . ASE, page 410-413. ACM, (2005)Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization (Extended Version)., , , , , , , , , and 5 other author(s). CoRR, (2024)Hardness for Explicit State Software Model Checking Benchmarks., and . SEFM, page 247-256. IEEE Computer Society, (2007)Testing Dafny (experience paper)., , , , and . ISSTA, page 556-567. ACM, (2022)Symbolic execution with mixed concrete-symbolic solving., , and . ISSTA, page 34-44. ACM, (2011)Symbolically modeling concurrent MCAPI executions., , and . PPoPP, page 307-308. ACM, (2011)Block public access: trust safety verification of access control policies., , , , , , , , , and 4 other author(s). ESEC/SIGSOFT FSE, page 281-291. ACM, (2020)Helping system engineers bridge the peaks., , , , , , and . TwinPeaks, page 9-13. ACM, (2014)An Improved Distance Heuristic Function for Directed Software Model Checking., and . FMCAD, page 60-67. IEEE Computer Society, (2006)Symbolic PathFinder: symbolic execution of Java bytecode., and . ASE, page 179-180. ACM, (2010)