Author of the publication

Unbounded Symbolic Execution for Program Verification.

, , and . RV, volume 7186 of Lecture Notes in Computer Science, page 396-411. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study of set-sharing analysis via cliques., , and . CoRR, (2005)Efficient Top-Down Set-Sharing Analysis Using Cliques., , and . PADL, volume 3819 of Lecture Notes in Computer Science, page 183-198. Springer, (2006)TRACER: A Symbolic Execution Tool for Verification., , , and . CAV, volume 7358 of Lecture Notes in Computer Science, page 758-766. Springer, (2012)Executable Counterexamples in Software Model Checking., , , , and . VSTTE, volume 11294 of Lecture Notes in Computer Science, page 17-37. Springer, (2018)Negative Ternary Set-Sharing., , , , and . ICLP, volume 5366 of Lecture Notes in Computer Science, page 301-316. Springer, (2008)An Efficient, Parametric Fixpoint Algorithm for Analysis of Java Bytecode., , and . Electron. Notes Theor. Comput. Sci., 190 (1): 51-66 (2007)Verifying Solidity Smart Contracts via Communication Abstraction in SmartACE., , , , , and . VMCAI, volume 13182 of Lecture Notes in Computer Science, page 425-449. Springer, (2022)Towards Parameterized Regular Type Inference Using Set Constraints, , and . CoRR, (2010)Failure tabled constraint logic programming by interpolation., , , , and . TPLP, 13 (4-5): 593-607 (2013)Signedness-Agnostic Program Analysis: Precise Integer Bounds for Low-Level Code., , , and . APLAS, volume 7705 of Lecture Notes in Computer Science, page 115-130. Springer, (2012)