Author of the publication

Resource Usage Analysis and Its Application to Resource Certification.

, , , , and . FOSAD, volume 5705 of Lecture Notes in Computer Science, page 258-288. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards product configuration taking into account quality concerns., , and . SPLC (2), page 82-90. ACM, (2012)SICOMORo-CM: Development of Trustworthy Systems via Models and Advanced Tools., , , , , , , , and . STAF Workshops, volume 10748 of Lecture Notes in Computer Science, page 367-374. Springer, (2017)Cost analysis of object-oriented bytecode programs., , , , and . Theor. Comput. Sci., 413 (1): 142-159 (2012)Reachability-based acyclicity analysis by Abstract Interpretation., and . Theor. Comput. Sci., (2013)Higher-Order Abstract Non-interference.. TLCA, volume 3461 of Lecture Notes in Computer Science, page 417-432. Springer, (2005)Reachability-based Acyclicity Analysis by Abstract Interpretation, and . CoRR, (2012)COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode., , , , and . FMCO, volume 5382 of Lecture Notes in Computer Science, page 113-132. Springer, (2007)Certified abstract non-interference.. University of Verona, Italy, (2006)Automatic Inference of Bounds on Resource Consumption., , , , , , , , , and 2 other author(s). FMCO, volume 7866 of Lecture Notes in Computer Science, page 119-144. Springer, (2012)Abstract Program Slicing: an Abstract Interpretation-based approach to Program Slicing., and . CoRR, (2016)