Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Concurrent Utilities in Jackal: A Software DSM Implementation., , and . ICDCN, volume 4904 of Lecture Notes in Computer Science, page 176-181. Springer, (2008)Semiformal verification of temporal properties in automotive hardware dependent software., , , , , , , , and . DATE, page 1214-1217. IEEE, (2009)Verification of Temporal Properties in Automotive Embedded Software., , , , , , , and . DATE, page 164-169. ACM, (2008)Fast falsification based on symbolic bounded property checking., , , , , and . DAC, page 1077-1082. ACM, (2006)GLA: gate-level abstraction revisited., , , , , and . DATE, page 1399-1404. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Semiformal Verification of Temporal Properties in Embedded Software., , , , , , , and . MBMV, page 19-28. Shaker, (2007)Grid Based Fast Falsification For Bounded Property Checking., , , , , and . FDL, page 299-304. ECSI, (2007)FVCAG: A framework for formal verification driven power modeling and verification., , , , and . ISLPED, page 260-265. ACM, (2016)Overlap reduction in symbolic system traversal., , , , , and . HLDVT, page 145-152. IEEE Computer Society, (2005)Effective Liveness Verification Using a Transformation-Based Framework., , , , and . VLSI Design, page 74-79. IEEE Computer Society, (2014)