Search for persons
X
?
2022 IEEE Power & Energy Society General Meeting (PESGM) ,
3
Privacy-Friendly Peer-to-Peer Energy Trading: A Game Theore..:
, In:
?
2022 IEEE Secure Development Conference (SecDev) ,
4
Position Paper: Towards a Hybrid Approach to Protect Agains..:
, In:
?
Tools and Algorithms for the Construction and Analysis of Systems; Lecture Notes in Computer Science ,
6
JBMC: Bounded Model Checking for Java Bytecode: (Competitio..:
, In:
?
Tools and Algorithms for the Construction and Analysis of Systems; Lecture Notes in Computer Science ,
9
ESBMC v6.0: Verifying C Programs Using k-Induction and Inva..:
, In:
?
Tools and Algorithms for the Construction and Analysis of Systems; Lecture Notes in Computer Science ,
10
Map2Check Using LLVM and KLEE: (Competition Contribution):
, In:
?
Computer Aided Verification; Lecture Notes in Computer Science ,
11
JBMC: A Bounded Model Checking Tool for Verifying Java Byte..:
, In:
?
Proceedings of the 21st International Conference on Hybrid Systems: Computation and Control (part of CPS Week) ,
12
DSValidator : An Automated Counterexample Reproducibilit..:
, In:
?
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering ,
13
DSSynth: an automated digital controller synthesis tool for..:
, In:
?
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis ,
14
Verifying digital systems with MATLAB:
, In:
?
Proceedings of the 20th International Conference on Hybrid Systems: Computation and Control ,
15