Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User-defined backtracking criteria for symbolic execution., and . ACM SIGSOFT Softw. Eng. Notes, 39 (1): 1-5 (2014)PAClab: a program analysis collaboratory., , , and . ESEC/SIGSOFT FSE, page 1616-1620. ACM, (2020)Redesigning Soot's data-flow analysis framework for abstract interpretation.. ISSTA/ECOOP Workshops, page 78-84. ACM, (2018)Exploiting Domain and Program Structure to Synthesize Efficient and Precise Data Flow Analyses (T)., and . ASE, page 608-618. IEEE Computer Society, (2015)Formal specification and verification of user-centric privacy policies for ubiquitous systems., , , and . IDEAS, page 31:1-31:10. ACM, (2019)Minimizing the Size of Path Conditions Using Convex Polyhedra Abstract Domain., and . ACM SIGSOFT Softw. Eng. Notes, 40 (1): 1-5 (2015)Structurally Defined Conditional Data-Flow Static Analysis., and . TACAS (2), volume 10806 of Lecture Notes in Computer Science, page 249-265. Springer, (2018)Accurate String Constraints Solution Counting with Weighted Automata., and . ASE, page 440-452. IEEE, (2019)Saturation-based testing of concurrent programs., , and . ESEC/SIGSOFT FSE, page 53-62. ACM, (2009)The Java Pathfinder Workshop 2019., , , , , , , , , and 28 other author(s). ACM SIGSOFT Softw. Eng. Notes, 45 (2): 20-22 (2020)