Other Results
-
2022
Low-Level Bi-Abduction (Artifact), other unclassified results, 2022
Authors: ROGALEWICZ, A.; ŠOKOVÁ, V.; VOJNAR, T.; HOLÍK, L.; PERINGER, P.; ZULEGER, F.Low-Level Bi-Abduction (technical report), report, 2022
Authors: HOLÍK, L.; PERINGER, P.; ROGALEWICZ, A.; ŠOKOVÁ, V.; VOJNAR, T.; ZULEGER, F. -
2019
PredatorHP Attacks Interval-Sized Regions, report, 2019
Authors: KOTOUN, M.; PERINGER, P.; ŠOKOVÁ, V.; VOJNAR, T. -
2016
From Low-Level Pointers to High-Level Containers, Technical Report No. FIT-TR-2015-03, report, 2016
Authors: DUDKA, K.; HOLÍK, L.; PERINGER, P.; TRTÍK, M.; VOJNAR, T. -
2013
Byte-Precise Verification of Low-Level List Manipulation, report, 2013
Authors: DUDKA, K.; PERINGER, P.; VOJNAR, T. -
2011
Predator: A Practical Tool for Checking Manipulation of Dynamic Data Structures Using Separation Logic, report, 2011
Authors: DUDKA, K.; PERINGER, P.; VOJNAR, T. -
1992
Modelování a simulace, course reader, 1992
Authors: RÁBOVÁ, Z.; ZENDULKA, J.; ČEŠKA, M.; PERINGER, P.; JANOUŠEK, V.