Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SMT-based bounded model checking of fixed-point digital controllers., , , and . IECON, page 295-301. IEEE, (2014)A secondary screen architecture to accurately capture viewers' interactions in an iTV environment., , and . GCCE, page 264-265. IEEE, (2014)TXM: an agile HW/SW development methodology for building medical devices., , , , , and . ACM SIGSOFT Softw. Eng. Notes, (2007)Model checking LTL properties over ANSI-C programs with bounded traces., , , and . Softw. Syst. Model., 14 (1): 65-81 (2015)Applying SMT-based verification to hardware/software partitioning in embedded systems., and . Des. Autom. Embed. Syst., 20 (1): 1-19 (2016)Verifying Embedded C Software with Timing Constraints using an Untimed Model Checker, , and . CoRR, (2011)Incremental Verification of Fixed-Point Implementations of Neural Networks., , , , and . CoRR, (2020)Counterexample Guided Inductive Optimization., , , , and . CoRR, (2017)FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs., , , and . CoRR, (2020)JBMC: A Bounded Model Checking Tool for Java Bytecode., , , and . CoRR, (2023)