Author of the publication

Effcient Symbolic Model Checking of Software Using Partial Disjunctive Partitioning.

, and . CHARME, volume 2860 of Lecture Notes in Computer Science, page 35-50. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effcient Symbolic Model Checking of Software Using Partial Disjunctive Partitioning., and . CHARME, volume 2860 of Lecture Notes in Computer Science, page 35-50. Springer, (2003)Combining Symmetry Reduction and Under-Approximation for Symbolic Model Checking., and . Formal Methods in System Design, 27 (1-2): 29-66 (2005)Combining Symmetry Reduction and Under-Approximation for Symbolic Model Checking., and . CAV, volume 2404 of Lecture Notes in Computer Science, page 93-106. Springer, (2002)Symbolic Localization Reduction with Reconstruction Layering and Backtracking., , and . CAV, volume 2404 of Lecture Notes in Computer Science, page 65-77. Springer, (2002)Wolf - Bug Hunter for Concurrent Software Using Formal Methods., , and . CAV, volume 3576 of Lecture Notes in Computer Science, page 153-157. Springer, (2005)An Algorithmic Approach to Design Exploration., , , , and . FME, volume 2391 of Lecture Notes in Computer Science, page 146-162. Springer, (2002)ExpliSAT: Guiding SAT-Based Software Verification with Explicit States., , , , and . Haifa Verification Conference, volume 4383 of Lecture Notes in Computer Science, page 138-154. Springer, (2006)Verifying Parallel Code After Refactoring Using Equivalence Checking., , , and . International Journal of Parallel Programming, 47 (1): 59-73 (2019)CloudWave: Where adaptive cloud management meets DevOps., , , , , , , , , and 6 other author(s). ISCC, page 1-6. IEEE Computer Society, (2014)Deep Ahead-of-Threat Virtual Patching., , , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 99-109. Springer, (2018)