Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs., , , and . FM, volume 8442 of Lecture Notes in Computer Science, page 263-278. Springer, (2014)Error explanation with distance metrics., , , and . Int. J. Softw. Tools Technol. Transf., 8 (3): 229-247 (2006)Loop summarization using state and transition invariants., , , , and . Formal Methods Syst. Des., 42 (3): 221-261 (2013)A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability., , , , , , , and . Comput. Sci. Rev., (2020)Semantic Adversarial Perturbations using Learnt Representations., , and . CoRR, (2020)Towards a Classification of Hamiltonian Cycles in the 6-Cube., and . J. Satisf. Boolean Model. Comput., 4 (1): 57-74 (2008)An Interpolating Sequent Calculus for Quantifier-Free Presburger Arithmetic., , , and . J. Autom. Reason., 47 (4): 341-367 (2011)Ranking Policy Decisions., , , and . CoRR, (2020)Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters., , and . ACM Conference on Computer and Communications Security, page 1689-1706. ACM, (2019)Logically-Constrained Neural Fitted Q-Iteration., , and . CoRR, (2018)