Author:
Kroening Daniel,Lewis Matt,Weissenbacher Georg
Publisher
Springer International Publishing
Reference27 articles.
1. Aho, A.V., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools. Addison-Wesley Longman Publishing Co., Inc., Boston (1986)
2. Baumgartner, J., Kuehlmann, A.: Enhanced diameter bounding via structural transformations. In: Design, Automation and Test in Europe (DATE), pp. 36–41. IEEE (2004)
3. Beyer, D.: Status Report on Software Verification (Competition Summary SV-COMP 2014). In: Ábrahám, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 373–388. Springer, Heidelberg (2014)
4. Beyer, D., Henzinger, T.A., Majumdar, R., Rybalchenko, A.: Path invariants. In: Programming Language Design and Implementation (PLDI), pp. 300–309. ACM (2007)
5. Biere, A., Cimatti, A., Clarke, E., Zhu, Y.: Symbolic model checking without BDDs. In: Cleaveland, W.R. (ed.) TACAS/ETAPS 1999. LNCS, vol. 1579, pp. 193–207. Springer, Heidelberg (1999)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Integrating Loop Acceleration Into Bounded Model Checking;Lecture Notes in Computer Science;2024-09-11
2. Summarization of branching loops;Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing;2022-04-25
3. Automatic Loop Summarization via Path Dependency Analysis;IEEE Transactions on Software Engineering;2019-06-01
4. Program Synthesis for Program Analysis;ACM Transactions on Programming Languages and Systems;2018-06-30
5. Testing the Trustworthiness of IC Testing: An Oracle-Less Attack on IC Camouflaging;IEEE Transactions on Information Forensics and Security;2017-11