Publications
Export 88 results:
[ Author] Title Type Year Filters: Simone-fulvio-rollini-roberto-bruttomesso-natasha-sharygina-2010-efficient-and-flexible-approach-resolution-proof-r is [Clear All Filters]
PeRIPLO: A Framework for Producing Efficient Interpolants for SAT-based Software Verification,
, Logic for Programming Artificial Intelligence and Reasoning (LPAR), Stellenbosch, South Africa, (2013)
Leveraging Interpolant Strength in Model Checking,
, 24th International Conference on Computer Aided Verification (CAV), Berkeley, California, USA, (2012)
Resolution Proof Transformation for Compression and Interpolation,
, CoRR, Volume July 2013, (2013)
FunFrog: Bounded Model Checking with Interpolation-based Function Summarization,
, Tenth International Symposium on Automated Technology for Verification and Analysis (ATVA), Thiruvananthapuram, India, (2012)
Interpolation-based Function Summaries in Bounded Model Checking,
, Haifa Verification Conference (HVC), Haifa, Israel, (2011)
Incremental Upgrade Checking by Means of Interpolation-based Function Summaries,
, Twelfth International Conference on Formal Methods in Computer-Aided Design (FMCAD), Cambridge, UK, (2012)
Modeling for Verification,
, Handbook of Model Checking, (2018)
An abstraction refinement approach combining precise and approximated techniques,
, International Journal on Software Tools for Technology Transfer (STTT), Volume 14, (2012)
An abstraction refinement approach combining precise and approximated techniques,
, International Journal on Software Tools for Technology Transfer (STTT), Volume 14, p.1-14, (2012)
The Synergy of Precise and Fast Abstractions for Program Verification,
, 24th Annual ACM Symposium on Applied Computing (SAC), Honolulu, USA, (2009)
Scalable Abstractions for Efficient Security Checks,
, Lugano, p.164, (2011)
Loop Summarization and Termination Analysis,
, International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Volume 6605, Saarbrü Germany, p.81-95, (2011)
Detection of Security Vulnerabilities Using Guided Model Checking,
, 24th International Conference on Logic Programming (ICLP), Udine, Italy, (2008)
Pages
- « first
- ‹ previous
- 1
- 2
- 3
- 4