Publications
Export 88 results:
Author Title Type [ Year] Filters: Simone-fulvio-rollini-ondrej-sery-natasha-sharygina-2012-leveraging-interpolant-strength-model-checking is [Clear All Filters]
An Efficient and Flexible Approach to Resolution Proof Reduction,
, Haifa Verification Conference (HVC), Haifa, Israel, (2010)
Flexible Interpolation with Local Proof Transformations,
, International Conference of Computer Aided Design (ICCAD), San Jose, USA, (2010)
A Flexible Schema for Generating Explanations in Lazy Theory Propagation,
, International Conference on Formal Methods and Models for Codesign (MEMOCODE), Grenoble, France, (2010)
A Model Checking-based Approach for Security Policy Verification of Mobile Systems,
, Formal Aspects of Computing Journal, (2010)
The OpenSMT Solver,
, International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Volume 6015, Paphos, Cyprus, p.150-153, (2010)
Termination Analysis with Compositional Transition Invariants,
, International Conference on Computer-Aided Verification (CAV), Edinburgh, UK, (2010)
An Extension of the Davis-Putnam Procedure and its Application to Preprocessing in SMT,
, 7th International Workshop on Satisfiability Modulo Theories (SMT), Montreal, Canada, (2009)
Loopfrog: A Static Analyzer for ANSI-C Programs,
, The 24th IEEE/ACM International Conference on Automated Software Engineering, Auckland, New Zealand, (2009)
A Scalable Decision Procedure for Fixed-Width Bit-Vectors,
, International Conference of Computer Aided Design (ICCAD), San Jose (CA), (2009)
The Synergy of Precise and Fast Abstractions for Program Verification,
, 24th Annual ACM Symposium on Applied Computing (SAC), Honolulu, USA, (2009)
Detection of Security Vulnerabilities Using Guided Model Checking,
, 24th International Conference on Logic Programming (ICLP), Udine, Italy, (2008)
Loop Summarization using Abstract Transformers,
, 6th International Symposium on Automated Technology for Verification and Analysis (ATVA), Seoul, South Korea, (2008)
Automated Verification of Security Policies in Mobile Code.,
, Integrated Formal Methods (IFM), (2007)
Pages
- « first
- ‹ previous
- 1
- 2
- 3
- 4