Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof-based coverage metrics for formal verification., , , , and . ASE, page 194-199. IEEE Computer Society, (2017)SIMPAL: a compositional reasoning framework for imperative programs., , and . SPIN, page 90-93. ACM, (2017)SpeAR v2.0: Formalized Past LTL Specification and Analysis of Requirements., , , , , and . NFM, volume 10227 of Lecture Notes in Computer Science, page 420-426. (2017)Study on the Barriers to the Industrial Adoption of Formal Methods., , , , , , , , and . FMICS, volume 8187 of Lecture Notes in Computer Science, page 63-77. Springer, (2013)Development of Security Software: A High Assurance Methodology., , , , and . ICFEM, volume 5885 of Lecture Notes in Computer Science, page 266-285. Springer, (2009)The JKind Model Checker., , , , and . CoRR, (2017)The JKind Model Checker., , , , and . CAV (2), volume 10982 of Lecture Notes in Computer Science, page 20-27. Springer, (2018)Qualification of a Model Checker for Avionics Software Verification., , , , and . NFM, volume 10227 of Lecture Notes in Computer Science, page 404-419. (2017)Model Checking Information Flow., , and . Design and Verification of Microprocessor Systems for High-Assurance Applications, Springer, (2010)