Follow
Ahmed Rezine
Title
Cited by
Cited by
Year
String constraints for verification
PA Abdulla, MF Atig, YF Chen, L Holík, A Rezine, P Rümmer, J Stenman
Computer Aided Verification: 26th International Conference, CAV 2014, Held …, 2014
1232014
Regular model checking without transducers (on efficient verification of parameterized systems)
PA Abdulla, G Delzanno, NB Henda, A Rezine
Tools and Algorithms for the Construction and Analysis of Systems: 13th …, 2007
1222007
Norn: An SMT solver for string constraints
PA Abdulla, MF Atig, YF Chen, L Holík, A Rezine, P Rümmer, J Stenman
International conference on computer aided verification, 462-469, 2015
1052015
Parameterized verification of infinite-state processes with global conditions
PA Abdulla, G Delzanno, A Rezine
Computer Aided Verification: 19th International Conference, CAV 2007, Berlin …, 2007
962007
Stability-aware integrated routing and scheduling for control applications in Ethernet networks
R Mahfouzi, A Aminifar, S Samii, A Rezine, P Eles, Z Peng
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 682-687, 2018
712018
Counter-example guided fence insertion under TSO
PA Abdulla, MF Atig, YF Chen, C Leonardsson, A Rezine
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
702012
An integrated specification and verification technique for highly concurrent data structures
PA Abdulla, F Haziza, L Holík, B Jonsson, A Rezine
International Journal on Software Tools for Technology Transfer 19, 549-563, 2017
622017
Flatten and conquer: a framework for efficient analysis of string constraints
PA Abdulla, MF Atig, YF Chen, BP Diep, L Holík, A Rezine, P Rümmer
ACM SIGPLAN Notices 52 (6), 602-617, 2017
582017
Monotonic abstraction for programs with dynamic memory heaps
PA Abdulla, A Bouajjani, J Cederberg, F Haziza, A Rezine
Computer Aided Verification: 20th International Conference, CAV 2008 …, 2008
502008
Quantifying the information leakage in cache attacks via symbolic execution
S Chattopadhyay, M Beck, A Rezine, A Zeller
ACM Transactions on Embedded Computing Systems (TECS) 18 (1), 1-27, 2019
482019
Detecting key players in terrorist networks
A Berzinji, L Kaati, A Rezine
2012 European Intelligence and Security Informatics Conference, 297-302, 2012
482012
Handling parameterized systems with non-atomic global conditions
PA Abdulla, N Ben Henda, G Delzanno, A Rezine
Verification, Model Checking, and Abstract Interpretation: 9th International …, 2008
472008
Trau: SMT solver for string constraints
PA Abdulla, MF Atig, YF Chen, BP Diep, L Holík, A Rezine, P Rümmer
2018 Formal Methods in Computer Aided Design (FMCAD), 1-5, 2018
442018
Memorax, a Precise and Sound Tool for Automatic Fence Insertion under TSO
PA Abdulla, MF Atig, YF Chen, C Leonardsson, A Rezine
Tools and Algorithms for the Construction and Analysis of Systems: 19th …, 2013
412013
Constrained monotonic abstraction: A CEGAR for parameterized verification
PA Abdulla, YF Chen, G Delzanno, F Haziza, CD Hong, A Rezine
CONCUR 2010-Concurrency Theory: 21th International Conference, CONCUR 2010 …, 2010
342010
Automatic fence insertion in integer programs via predicate abstraction
PA Abdulla, MF Atig, YF Chen, C Leonardsson, A Rezine
Static Analysis: 19th International Symposium, SAS 2012, Deauville, France …, 2012
332012
Simulation-based iteration of tree transducers
PA Abdulla, A Legay, J d’Orso, A Rezine
Tools and Algorithms for the Construction and Analysis of Systems: 11th …, 2005
322005
Monotonic abstraction: on efficient verification of parameterized systems
PA Abdulla, G Delzanno, NB Henda, A Rezine
International Journal of Foundations of Computer Science 20 (05), 779-801, 2009
302009
Tree regular model checking: A simulation-based approach
PA Abdulla, A Legay, J d’Orso, A Rezine
The Journal of Logic and Algebraic Programming 69 (1-2), 93-121, 2006
302006
Invariant synthesis for programs manipulating lists with unbounded data
A Bouajjani, C Drăgoi, C Enea, A Rezine, M Sighireanu
Computer Aided Verification: 22nd International Conference, CAV 2010 …, 2010
262010
The system can't perform the operation now. Try again later.
Articles 1–20