Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing Almost-Sure Reachability in POMDPs., , and . CoRR, (2020)Gradient Descent over Metagrammars for Syntax-Guided Synthesis., , and . CoRR, (2020)Verifying RISC-V Physical Memory Protection., , , , , and . CoRR, (2022)Scenic: A Language for Scenario Specification and Data Generation., , , , , , and . CoRR, (2020)Specification-Guided Data Aggregation for Semantically Aware Imitation Learning., , , , , and . CoRR, (2023)Context-Aided Variable Elimination for Requirement Engineering., , , , and . CoRR, (2023)Synthesis of Obfuscation Policies to Ensure Privacy and Utility., , , , and . J. Autom. Reason., 60 (1): 107-131 (2018)Deciding Quantifier-Free Presburger Formulas Using Parameterized Solution Bounds., and . Logical Methods in Computer Science, (2005)Verifying High-Confidence Interactive Systems: Electronic Voting and Beyond.. ICDCN, volume 7730 of Lecture Notes in Computer Science, page 1-10. Springer, (2013)Modeling and Verifying Systems Using a Logic of Counter Arithmetic with Lambda Expressions and Uninterpreted Functions., , and . CAV, volume 2404 of Lecture Notes in Computer Science, page 78-92. Springer, (2002)