Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specification and Checking of Software Contracts for Conditional Information Flow., , , , , and . FM, volume 5014 of Lecture Notes in Computer Science, page 229-245. Springer, (2008)Specification and Checking of Software Contracts for Conditional Information Flow., , , , , and . Design and Verification of Microprocessor Systems for High-Assurance Applications, Springer, (2010)Information Security Modeling and Analysis.. Design and Verification of Microprocessor Systems for High-Assurance Applications, Springer, (2010)A Mechanized Proof of Bounded Convergence Time for the Distributed Perimeter Surveillance System (DPSS) Algorithm A., , and . ACL2, volume 359 of EPTCS, page 33-47. (2022)Trapezoidal Generalization over Linear Constraints., and . ACL2, volume 280 of EPTCS, page 30-46. (2018)Development of a Translator from LLVM to ACL2., , , and . ACL2, volume 152 of EPTCS, page 163-177. (2014)Parameterized congruences in ACL2.. ACL2, page 28-34. ACM, (2006)SIMPAL: a compositional reasoning framework for imperative programs., , and . SPIN, page 90-93. ACM, (2017)Formal Verification of Partition Management for the AAMP7G Microprocessor., , , and . Design and Verification of Microprocessor Systems for High-Assurance Applications, Springer, (2010)Symbolic Simulation of the JEM1 Microprocessor.. FMCAD, volume 1522 of Lecture Notes in Computer Science, page 321-333. Springer, (1998)