Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Symbolic Verification of Weakly Extended PAD., , and . Electr. Notes Theor. Comput. Sci., 175 (3): 47-64 (2007)Joint Forces for Memory Safety Checking., , and . SPIN, volume 10869 of Lecture Notes in Computer Science, page 115-132. Springer, (2018)Symbolic Memory with Pointers., and . ATVA, volume 8837 of Lecture Notes in Computer Science, page 380-395. Springer, (2014)On the Complexity of the Quantified Bit-Vector Arithmetic with Binary Encoded Bit-Widths., and . CoRR, (2016)On Synergy of Metal, Slicing, and Symbolic Execution, , and . CoRR, (2012)Is Satisfiability of Quantified Bit-Vector Formulas Stable Under Bit-Width Changes? (Experimental Paper)., and . LPAR, volume 57 of EPiC Series in Computing, page 488-497. EasyChair, (2018)The stuttering principle revisited., and . Acta Inf., 41 (7-8): 415-434 (2005)Decidable Race Condition and Open Coregions in HMSC., , , and . ECEASST, (2010)Solving Quantified Bit-Vector Formulas Using Binary Decision Diagrams., and . SAT, volume 9710 of Lecture Notes in Computer Science, page 267-283. Springer, (2016)Symbiotic 4: Beyond Reachability - (Competition Contribution)., , , , and . TACAS (2), volume 10206 of Lecture Notes in Computer Science, page 385-389. (2017)