Name
Affiliation
Papers
WEI-NGAN CHIN
National University of Singapore, Singapore
101
Collaborators
Citations 
PageRank 
96
868
63.37
Referers 
Referees 
References 
1012
1441
1426
Search Limit
1001000
Title
Citations
PageRank
Year
Automated Repair of Heap-Manipulating Programs Using Deductive Synthesis.00.342021
SL-COMP: Competition of Solvers for Separation Logic00.342019
Variant Region Types00.342018
Automated Modular Verification for Relaxed Communication Protocols.00.342018
Verification of C Buffer Overflows in C Programs10.362018
HipTNT+: A Termination and Non-termination Analyzer by Second-Order Abduction - (Competition Contribution).00.342017
Threads as Resource for Concurrency Verification20.362015
Expressive program verification via structured specifications20.372014
A Resource-Based Logic for Termination and Non-termination Proofs.50.402014
Automatically refining partial specifications for heap-manipulating programs60.442014
Shape Analysis via Second-Order Bi-Abduction.130.532014
A Proof Slicing Framework for Program Verification.00.342013
Automated Specification Discovery via User-Defined Predicates.30.392013
Verification of Static and Dynamic Barrier Synchronization Using Bounded Permissions.60.472013
Dual analysis for proving safety and finding bugs70.452013
Specification, Verification and Inference (Invited Talk).00.342013
Invariants synthesis over a combined domain for automated program verification20.382013
Towards Complete Specifications with an Error Calculus.40.412013
Bi-Abduction with Pure Properties for Specification Inference.60.432013
An Expressive Framework for Verifying Deadlock Freedom.20.382013
Loop invariant synthesis in a combined abstract domain80.492013
Structured Specification for Program Verification00.342012
Automated verification of shape, size and bag properties via user-defined predicates in separation logic621.512012
From Verification to Specification Inference00.342012
Variable permissions for concurrency verification20.362012
Structured specifications for better verification of heap-manipulating programs100.662011
Immutable specifications for more concise and precise verification40.452011
FIXBAG: a fixpoint calculator for quantified bag constraints80.462011
A specialization calculus for pruning disjunctive predicates to support verification50.432011
Automatically refining partial specifications for program verification70.552011
A HIP and SLEEK verification system60.452011
Discovering Specifications for Unknown Procedures - Work in Progress.00.342010
Stack Bound Inference for Abstract Java Bytecode20.362010
Verifying heap-manipulating programs with unknown procedure calls00.342010
Test Case Generation for Adequacy of Floating-point to Fixed-point Conversion20.412010
Loop invariant synthesis in a combined domain70.442010
Verifying pointer safety for programs with unknown calls50.502010
Completeness of Pointer Program Verification by Separation Logic30.392009
A rigorous methodology for specification and verification of business processes30.392009
Memory Usage Verification Using Hip/Sleek60.452009
Optimizing the parallel computation of linear recurrences using compact matrix representations20.422009
TASE 2009, Third IEEE International Symposium on Theoretical Aspects of Software Engineering, 29-31 July 2009, Tianjin, China575.172009
An Interval-Based Inference of Variant Parametric Types50.432009
Translation and optimization for a core calculus with exceptions20.432009
A Formal Soundness Proof of Region-Based Memory Management for Object-Oriented Paradigm10.362008
A practical and precise inference and specializer for array bound checks elimination70.502008
Enhancing Program Verification with Lemmas341.202008
A Fast Algorithm to Compute Heap Memory Bounds of Java Card Applets40.432008
A Flow-Sensitive Region Inference for CLI30.402008
Analysing memory resource bounds for low-level programs311.442008
  • 1
  • 2