Author of the publication

Relative Safety.

, , and . VMCAI, volume 3855 of Lecture Notes in Computer Science, page 282-297. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Jaffar, Joxan
add a person with the name Jaffar, Joxan
 

Other publications of authors with the same name

An Efficient Distributed Deadlock Avoidance Algorithm for the AND Model., , and . IEEE Trans. Software Eng., 28 (1): 18-29 (2002)Comments on "General Failure of Logic Programs"., , and . J. Log. Program., 3 (2): 115-118 (1986)see JLP 2: 157-165 (1985).Minimal and Complete Word Unification. J. ACM, 37 (1): 47-85 (January 1990)Precise Cache Timing Analysis via Symbolic Execution., , and . RTAS, page 293-304. IEEE Computer Society, (2016)S3: A Symbolic String Solver for Vulnerability Detection in Web Applications., , and . ACM Conference on Computer and Communications Security, page 1232-1243. ACM, (2014)A Framework for Combining Analysis and Verification., , and . POPL, page 26-39. ACM, (2000)A Decision Procedure for a Class of Set Constraints (Extended Abstract), and . LICS, page 42-51. IEEE Computer Society, (1990)Forward and Backward Chaining in Constraint Programming (Abstract)., , and . LPNMR, volume 1265 of Lecture Notes in Computer Science, page 1. Springer, (1997)Modeling Systems in CLP., , and . ICLP, volume 3668 of Lecture Notes in Computer Science, page 412-413. Springer, (2005)Path-sensitive resource analysis compliant with assertions., and . EMSOFT, page 15:1-15:10. IEEE, (2013)