Author of the publication

Lifted-FL: A Pragmatic Implementation of Combined Model Checking and Theorem Proving.

, , and . TPHOLs, volume 1690 of Lecture Notes in Computer Science, page 323-340. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simplifying design and verification for structural hazards and datapaths in pipelined circuits., and . HLDVT, page 31-36. IEEE Computer Society, (2004)Toward a Super Duper Hardware Tactic., , and . HUG, volume 780 of Lecture Notes in Computer Science, page 399-412. Springer, (1993)Lifted-FL: A Pragmatic Implementation of Combined Model Checking and Theorem Proving., , and . TPHOLs, volume 1690 of Lecture Notes in Computer Science, page 323-340. Springer, (1999)Xs are for Trajectory Evaluation, Booleans are for Theorem Proving., , and . CHARME, volume 1703 of Lecture Notes in Computer Science, page 202-218. Springer, (1999)Reasoning About Pipelines with Structural Hazards., and . TPCD, volume 901 of Lecture Notes in Computer Science, page 13-32. Springer, (1994)A general decomposition strategy for verifying register renaming., and . DAC, page 234-237. ACM, (2004)An industrially effective environment for formal hardware verification., , , , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 24 (9): 1381-1405 (2005)Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic., , and . IEEE Trans. Computers, 68 (1): 67-82 (2019)Hardware implementations of the WG-5 cipher for passive RFID tags., , and . HOST, page 29-34. IEEE Computer Society, (2013)Applications of Hierarchical Verification in Model Checking., , and . CHARME, volume 2144 of Lecture Notes in Computer Science, page 40-57. Springer, (2001)