Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Grand Challenge: Model Check Software., , and . VISSAS, volume 1 of NATO Security through Science Series D: Information and Communication Security, page 55-68. IOS Press, (2005)Verification of the Futurebus+ Cache Coherence Protocol., , , , , , and . CHDL, volume A-32 of IFIP Transactions, page 15-30. North-Holland, (1993)Reasoning About Networks With Many Identical Finite-State Processes., , and . PODC, page 240-248. ACM, (1986)Compiling Path Expressions into VLSI Circuits., , , and . POPL, page 191-204. ACM Press, (1985)A SAT-based algorithm for reparameterization in symbolic simulation., , and . DAC, page 524-529. ACM, (2004)Efficient SAT solving for non-clausal formulas using DPLL, graphs, and watched cuts., and . DAC, page 563-568. ACM, (2009)The Complexity of Propositional Linear Temporal Logics, and . STOC, page 159-168. ACM, (1982)Formal Modeling and Analysis of Pancreatic Cancer Microenvironment., , , , , and . CMSB, volume 9859 of Lecture Notes in Computer Science, page 289-305. Springer, (2016)Tutorial: Software Model Checking., and . ICFEM, volume 3308 of Lecture Notes in Computer Science, page 9-10. Springer, (2004)Environment Abstraction for Parameterized Verification., , and . VMCAI, volume 3855 of Lecture Notes in Computer Science, page 126-141. Springer, (2006)