Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-based Automated Testing of JavaScript Web Applications via Longer Test Sequences., , , , and . CoRR, (2019)A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs., , , and . ACM Trans. Softw. Eng. Methodol., 30 (3): 26:1-26:42 (2021)EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis., , , and . Proc. ACM Program. Lang., 8 (POPL): 848-881 (January 2024)Tractability of Separation Logic with Inductive Definitions: Beyond Lists., , and . CONCUR, volume 85 of LIPIcs, page 37:1-37:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)On Finite Alphabets and Infinite Bases II: Completed and Ready Simulation., , and . FoSSaCS, volume 3921 of Lecture Notes in Computer Science, page 1-15. Springer, (2006)Ready to preorder: The case of weak process semantics., , and . Inf. Process. Lett., 109 (2): 104-111 (2008)On the Axiomatizability of Impossible Futures., , and . Logical Methods in Computer Science, (2015)Orbit Problem Revisited, , and . CoRR, (2013)Making Agents' Abilities Explicit., , and . IEEE Access, (2019)Augmenting Bug Localization with Part-of-Speech and Invocation., , , and . International Journal of Software Engineering and Knowledge Engineering, 27 (6): 925-950 (2017)