From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lock allocation., , , и . POPL, стр. 291-296. ACM, (2007)Analysis of recursively parallel programs., и . POPL, стр. 203-214. ACM, (2012)SMACK software verification toolchain., , , , и . ICSE (Companion Volume), стр. 589-592. ACM, (2016)Finding Non-terminating Executions in Distributed Asynchronous Programs, и . Static Analysis, стр. 439--455. Berlin, Heidelberg, Springer, (2012)Violat: Generating Tests of Observational Refinement for Concurrent Objects., и . CAV (2), том 11562 из Lecture Notes in Computer Science, стр. 534-546. Springer, (2019)ct-fuzz: Fuzzing for Timing Leaks., , и . ICST, стр. 466-471. IEEE, (2020)Delay-bounded scheduling., , и . POPL, стр. 411-422. ACM, (2011)Parameterized verification of transactional memories., , и . PLDI, стр. 134-145. ACM, (2010)Asynchronous programs with prioritized task-buffers., , и . SIGSOFT FSE, стр. 48. ACM, (2012)Bounded phase analysis of message-passing programs., и . Int. J. Softw. Tools Technol. Transf., 16 (2): 127-146 (2014)