On compiling Boolean circuits optimized for secure multi-party computation. | 2 | 0.36 | 2017 |
On facilitating reuse in multi-goal test-suite generation for software product lines. | 0 | 0.34 | 2016 |
Error Invariants for Concurrent Traces. | 0 | 0.34 | 2016 |
Local Linearizability for Concurrent Container-Type Data Structures. | 1 | 0.36 | 2016 |
Compilation for Secure Two-Party Computations. | 0 | 0.34 | 2015 |
Closure properties and complexity of rational sets of regular languages | 0 | 0.34 | 2015 |
Perspectives on White-Box Testing: Coverage, Concurrency, and Concolic Execution | 0 | 0.34 | 2015 |
Facilitating Reuse in Multi-goal Test-Suite Generation for Software Product Lines. | 12 | 0.48 | 2015 |
Local Linearizability. | 0 | 0.34 | 2015 |
Reusing Information in Multi-Goal Reachability Analyses. | 0 | 0.34 | 2014 |
Concolic Testing of Concurrent Programs. | 0 | 0.34 | 2014 |
Con2colic testing | 12 | 0.51 | 2013 |
Information reuse for multi-goal reachability analyses | 11 | 0.51 | 2013 |
Challenges in compiler construction for secure two-party computation | 0 | 0.34 | 2013 |
On the Structure and Complexity of Rational Sets of Regular Languages | 2 | 0.36 | 2013 |
The first workshop on language support for privacy-enhancing technologies (PETShop'13) | 0 | 0.34 | 2013 |
Solving Constraints for Generational Search. | 0 | 0.34 | 2013 |
Proving Reachability Using FShell - (Competition Contribution). | 1 | 0.35 | 2012 |
Bounded-Interference sequentialization for testing concurrent programs | 2 | 0.36 | 2012 |
Secure two-party computations in ANSI C | 58 | 1.48 | 2012 |
Vinter: A Vampire-Based Tool for Interpolation. | 2 | 0.38 | 2012 |
Seamless testing for models and code | 5 | 0.48 | 2011 |
How did you specify your test suite | 15 | 0.58 | 2010 |
An introduction to test specification in FQL | 6 | 0.44 | 2010 |
Timely Time Estimates | 2 | 0.38 | 2010 |
Query-Driven Program Testing | 20 | 0.73 | 2009 |
Towards Resource Consumption-Aware Programming | 2 | 0.37 | 2009 |
FShell: Systematic Test Case Generation for Dynamic Analysis and Measurement | 31 | 1.10 | 2008 |
Using verification technology to specify and detect malware | 13 | 0.68 | 2007 |