Journal article published at Science of Computer Programming:
"Synthesizing Safe Policies under Probabilistic Constraints with Reinforcement Learning and Bayesian Model Checking" (and 2 more papers)

Publications of year 2008

(All PublicationsIndex)

Articles in conference or workshop proceedings

  1. F. Aslam, C. Schindelhauer, G. Ernst, D. Spyra, J. Meyer, and M. Zalloom.
    Introducing TakaTuka: a Java Virtual Machine for motes.
    In Proc. of the Embedded Network Sensor Systems (SENSYS), pages 399--400, 2008.
    Poster Abstract.

  2. Dirk Beyer.
    CCVisu: Automatic Visual Software Decomposition.
    In Proceedings of the 30th ACM/IEEE International Conference on Software Engineering (ICSE 2008, Leipzig, May 10-18), pages 967-968, 2008.
    ACM Press, New York (NY).
    [ Material ] [ Article ] Keyword(s): Structural Analysis and Comprehension.
    ICSE 2008, Leipzig, May 10-18,
    © 2008 ACM

  3. Dirk Beyer, Thomas A. Henzinger, and Grégory Théoduloz.
    Program Analysis with Dynamic Precision Adjustment.
    In Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008, L'Aquila, September 15-19), pages 29-38, 2008.
    IEEE Computer Society Press, Los Alamitos (CA).
    [ Article ] [ Presentation ] Keyword(s): BLAST, Software Model Checking.
    ASE 2008, L'Aquila, September 15-19.
    © 2008 IEEE

  4. Dirk Beyer, Damien Zufferey, and Rupak Majumdar.
    CSIsat: Interpolation for LA+EUF.
    In A. Gupta and S. Malik, editors, Proceedings of the 20th International Conference on Computer Aided Verification (CAV 2008, Princeton, NY, July 7-14), LNCS 5123, pages 304-308, 2008.
    Springer-Verlag, Heidelberg.
    [ Material ] [ Article ] Keyword(s): Software Model Checking.
    CAV 2008, Princeton (NY), July 7-14,
    Aarti Gupta, Sharad Malik, editors.
    © 2008 Springer-Verlag

Theses and projects (PhD, MSc, BSc, Project)

  1. CSIsat: Interpolation for LA+EUF, 2008.
    [ Material ] Keyword(s): Software Development Project.

(All PublicationsIndex)


This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Wed Feb 24 15:19:20 2021

This document was translated from BibTEX by bibtex2html