Author of the publication

Specifying and Verifying the Correctness of Dynamic Software Updates.

, , , , and . VSTTE, volume 7152 of Lecture Notes in Computer Science, page 278-293. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specifying and Verifying the Correctness of Dynamic Software Updates., , , , and . VSTTE, volume 7152 of Lecture Notes in Computer Science, page 278-293. Springer, (2012)The Inverse Method for the Logic of Bunched Implications., , , , and . LPAR, volume 3452 of Lecture Notes in Computer Science, page 466-480. Springer, (2004)Automatic numeric abstractions for heap-manipulating programs., , , and . POPL, page 211-222. ACM, (2010)An inductive synthesis framework for verifiable reinforcement learning., , , and . PLDI, page 686-701. ACM, (2019)Simulation and Analysis of Cryptographic Protocols., , , , and . DBSec, volume 201 of IFIP Conference Proceedings, page 89-100. Kluwer, (2000)Implementation and Verification of Programmable Security., , , and . DBSec, volume 256 of IFIP Conference Proceedings, page 285-299. Kluwer, (2002)THOR: A Tool for Reasoning about Shape and Arithmetic., , , and . CAV, volume 5123 of Lecture Notes in Computer Science, page 428-432. Springer, (2008)Instrumentation Analysis: An Automated Method for Producing Numeric Abstractions of Heap-Manipulating Programs.. Carnegie Mellon University, USA, (2010)Automatic numeric abstractions for heap-manipulating programs., , , and . POPL, page 211-222. ACM, (2010)A data-driven CHC solver., , and . PLDI, page 707-721. ACM, (2018)