Author of the publication

Certified Memory Usage Analysis.

, , , and . FM, volume 3582 of Lecture Notes in Computer Science, page 91-106. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Verification of Loop Bound Estimation for WCET Analysis., , and . VSTTE, volume 8164 of Lecture Notes in Computer Science, page 281-303. Springer, (2013)Verified compilation of linearizable data structures: mechanizing rely guarantee for semantic refinement., , , and . SAC, page 1881-1890. ACM, (2018)Sawja: Static Analysis Workshop for Java., , , , , , , and . FoVeOOS, volume 6528 of Lecture Notes in Computer Science, page 92-106. Springer, (2010)Verified Abstract Interpretation Techniques for Disassembling Low-level Self-modifying Code., , and . ITP, volume 8558 of Lecture Notes in Computer Science, page 128-143. Springer, (2014)Validating Dominator Trees for a Fast, Verified Dominance Test., , and . ITP, volume 9236 of Lecture Notes in Computer Science, page 84-99. Springer, (2015)Semantic reasoning about the sea of nodes., , and . CC, page 163-173. ACM, (2018)Preface., and . ECEASST, (2018)Soundly Handling Static Fields: Issues, Semantics and Analysis, and . CoRR, (2010)A Verified Information-Flow Architecture., , , , , , , , and . CoRR, (2015)Extracting a data flow analyser in constructive logic., , , and . Theor. Comput. Sci., 342 (1): 56-78 (2005)