Author of the publication

Region analysis for deductive verification of C programs.

, and . Programming and Computer Software, 42 (5): 257-278 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-level memory model with low-level pointer cast support for Jessie intermediate language., and . Programming and Computer Software, 41 (4): 197-207 (2015)Towards deductive verification of C programs with shared data., and . Programming and Computer Software, 42 (5): 324-332 (2016)CPAchecker with Sequential Combination of Explicit-Value Analyses and Predicate Analyses - (Competition Contribution)., , and . TACAS, volume 8413 of Lecture Notes in Computer Science, page 392-394. Springer, (2014)CPA-BAM-BnB: Block-Abstraction Memoization and Region-Based Memory Models for Predicate Abstractions - (Competition Contribution)., , , , and . TACAS (2), volume 10206 of Lecture Notes in Computer Science, page 355-359. (2017)Using linux device drivers for static verification tools benchmarking., , , , and . Programming and Computer Software, 38 (5): 245-256 (2012)A Memory Model for Deductively Verifying Linux Kernel Modules., and . Ershov Informatics Conference, volume 10742 of Lecture Notes in Computer Science, page 256-275. Springer, (2017)Region analysis for deductive verification of C programs., and . Programming and Computer Software, 42 (5): 257-278 (2016)CPA-BAM-Slicing: Block-Abstraction Memoization and Slicing with Region-Based Dependency Analysis - (Competition Contribution)., , , and . TACAS (2), volume 10806 of Lecture Notes in Computer Science, page 427-431. Springer, (2018)Lemma Functions for Frama-C: C Programs as Proofs., , and . CoRR, (2018)Experience of improving the blast static verification tool., , and . Programming and Computer Software, 38 (3): 134-142 (2012)