|
Search the dblp DataBase
Stephen Magill:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale
Implementation and Verification of Programmable Security. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:285-299 [Conf]
- Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi
Simulation and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:89-100 [Conf]
- Kevin Donnelly, Tyler Gibson, Neel Krishnaswami, Stephen Magill, Sungwoo Park
The Inverse Method for the Logic of Bunched Implications. [Citation Graph (0, 0)][DBLP] LPAR, 2004, pp:466-480 [Conf]
- Stephen Magill, Josh Berdine, Edmund M. Clarke, Byron Cook
Arithmetic Strengthening for Shape Analysis. [Citation Graph (0, 0)][DBLP] SAS, 2007, pp:419-436 [Conf]
THOR: A Tool for Reasoning about Shape and Arithmetic. [Citation Graph (, )][DBLP]
Finding heap-bounds for hardware synthesis. [Citation Graph (, )][DBLP]
Automatic numeric abstractions for heap-manipulating programs. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|