Author of the publication

Program Analysis with Local Policy Iteration.

, , and . VMCAI, volume 9583 of Lecture Notes in Computer Science, page 127-146. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abstracting cryptographic protocols with tree automata.. Sci. Comput. Program., 47 (2-3): 177-202 (2003)Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief.. CSFW, page 44-54. IEEE Computer Society, (1999)Anatomy of Alternating Quantifier Satisfiability (Work in progress)., , and . SMT@IJCAR, volume 20 of EPiC Series in Computing, page 120-130. EasyChair, (2012)An Abstract Monte-Carlo Method for the Analysis of Probabilistic Programs. CoRR, (2007)A static analyzer for large safety-critical software., , , , , , , and . PLDI, page 196-207. ACM, (2003)Optimal Abstraction on Real-Valued Programs.. SAS, volume 4634 of Lecture Notes in Computer Science, page 104-120. Springer, (2007)A Simple Abstraction of Arrays and Maps by Program Translation., and . SAS, volume 9291 of Lecture Notes in Computer Science, page 217-234. Springer, (2015)Cell Morphing: From Array Programs to Array-Free Horn Clauses., and . SAS, volume 9837 of Lecture Notes in Computer Science, page 361-382. Springer, (2016)Implementing Hash-Consed Structures in Coq., , and . ITP, volume 7998 of Lecture Notes in Computer Science, page 477-483. Springer, (2013)Polyhedra to the rescue of array interpolants., and . SAC, page 1745-1750. ACM, (2015)