default search action
Ahmed Rezine
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Ying Zhang, Aodi He, Jiaying Li, Ahmed Rezine, Zebo Peng, Erik Larsson, Tao Yang, Jianhui Jiang, Huawei Li:
On Modeling and Detecting Trojans in Instruction Sets. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 3226-3239 (2024) - [c35]Anahita Baninajjar, Ahmed Rezine, Amir Aminifar:
VNN: Verification-Friendly Neural Networks with Hard Robustness Guarantees. ICML 2024 - [i7]Anahita Baninajjar, Kamran Hosseini, Ahmed Rezine, Amir Aminifar:
Verified Relative Safety Margins for Neural Network Twins. CoRR abs/2409.16726 (2024) - 2023
- [c34]Anahita Baninajjar, Kamran Hosseini, Ahmed Rezine, Amir Aminifar:
SafeDeep: A Scalable Robustness Verification Framework for Deep Neural Networks. ICASSP 2023: 1-5 - [i6]Anahita Baninajjar, Ahmed Rezine, Amir Aminifar:
Verification-Friendly Deep Neural Networks. CoRR abs/2312.09748 (2023) - 2022
- [j12]Adrian Horga, Ahmed Rezine, Sudipta Chattopadhyay, Petru Eles, Zebo Peng:
Symbolic identification of shared memory based bank conflicts for GPUs. J. Syst. Archit. 127: 102518 (2022) - 2021
- [j11]Rouhollah Mahfouzi, Amir Aminifar, Soheil Samii, Ahmed Rezine, Petru Eles, Zebo Peng:
Breaking Silos to Guarantee Control Stability with Communication over Ethernet TSN. IEEE Des. Test 38(5): 48-56 (2021) - [j10]Parosh Aziz Abdulla, Frédéric Haziza, Lukás Holík, Bengt Jonsson, Ahmed Rezine:
Correction to: An integrated specification and verification technique for highly concurrent data structures. Int. J. Softw. Tools Technol. Transf. 23(5): 825 (2021) - 2020
- [j9]Ying Zhang, Krishnendu Chakrabarty, Zebo Peng, Ahmed Rezine, Huawei Li, Petru Eles, Jianhui Jiang:
Software-Based Self-Testing Using Bounded Model Checking for Out-of-Order Superscalar Processors. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(3): 714-727 (2020) - [c33]Zeinab Ganjei, Ahmed Rezine, Petru Eles, Zebo Peng:
Verifying Safety of Parameterized Heard-Of Algorithms. NETYS 2020: 209-226
2010 – 2019
- 2019
- [j8]Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller:
Quantifying the Information Leakage in Cache Attacks via Symbolic Execution. ACM Trans. Embed. Comput. Syst. 18(1): 7:1-7:27 (2019) - [c32]Zeinab Ganjei, Ahmed Rezine, Ludovic Henrio, Petru Eles, Zebo Peng:
On Reachability in Parameterized Phaser Programs. TACAS (1) 2019: 299-315 - 2018
- [c31]Rouhollah Mahfouzi, Amir Aminifar, Soheil Samii, Ahmed Rezine, Petru Eles, Zebo Peng:
Stability-aware integrated routing and scheduling for control applications in Ethernet networks. DATE 2018: 682-687 - [c30]Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Bui Phi Diep, Lukás Holík, Ahmed Rezine, Philipp Rümmer:
Trau: SMT solver for string constraints. FMCAD 2018: 1-5 - [i5]Zeinab Ganjei, Ahmed Rezine, Ludovic Henrio, Petru Eles, Zebo Peng:
On Reachability in Parameterized Phaser Programs. CoRR abs/1811.07142 (2018) - 2017
- [j7]Parosh Aziz Abdulla, Frédéric Haziza, Lukás Holík, Bengt Jonsson, Ahmed Rezine:
An integrated specification and verification technique for highly concurrent data structures. Int. J. Softw. Tools Technol. Transf. 19(5): 549-563 (2017) - [c29]Zeinab Ganjei, Ahmed Rezine, Petru Eles, Zebo Peng:
Safety verification of phaser programs. FMCAD 2017: 68-75 - [c28]Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller:
Quantifying the information leak in cache attacks via symbolic execution. MEMOCODE 2017: 25-35 - [c27]Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Bui Phi Diep, Lukás Holík, Ahmed Rezine, Philipp Rümmer:
Flatten and conquer: a framework for efficient analysis of string constraints. PLDI 2017: 602-617 - [i4]Zeinab Ganjei, Ahmed Rezine, Petru Eles, Zebo Peng:
Safety Verification of Phaser Programs. CoRR abs/1708.02801 (2017) - 2016
- [j6]Zeinab Ganjei, Ahmed Rezine, Petru Eles, Zebo Peng:
Counting dynamically synchronizing processes. Int. J. Softw. Tools Technol. Transf. 18(5): 517-534 (2016) - [c26]Zeinab Ganjei, Ahmed Rezine, Petru Eles, Zebo Peng:
Lazy Constrained Monotonic Abstraction. VMCAI 2016: 147-165 - [i3]Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller:
Quantifying the Information Leak in Cache Attacks through Symbolic Execution. CoRR abs/1611.04426 (2016) - 2015
- [c25]Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Lukás Holík, Ahmed Rezine, Philipp Rümmer, Jari Stenman:
Norn: An SMT Solver for String Constraints. CAV (1) 2015: 462-469 - [c24]Parosh Aziz Abdulla, Mohamed Faouzi Atig, Zeinab Ganjei, Ahmed Rezine, Yunyun Zhu:
Verification of Cache Coherence Protocols wrt. Trace Filters. FMCAD 2015: 9-16 - [c23]Zeinab Ganjei, Ahmed Rezine, Petru Eles, Zebo Peng:
Abstracting and Counting Synchronizing Processes. VMCAI 2015: 227-244 - 2014
- [c22]Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Lukás Holík, Ahmed Rezine, Philipp Rümmer, Jari Stenman:
String Constraints for Verification. CAV 2014: 150-166 - [c21]Pierre Ganty, Ahmed Rezine:
Ordered Counter-Abstraction - Refinable Subword Relations for Parameterized Verification. LATA 2014: 396-408 - 2013
- [c20]Parosh Aziz Abdulla, Sandhya Dwarkadas, Ahmed Rezine, Arrvindh Shriraman, Yunyun Zhu:
Verifying safety and liveness for the FlexTM hybrid transactional memory. DATE 2013: 785-790 - [c19]Parosh Aziz Abdulla, Frédéric Haziza, Lukás Holík, Bengt Jonsson, Ahmed Rezine:
An Integrated Specification and Verification Technique for Highly Concurrent Data Structures. TACAS 2013: 324-338 - [c18]Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Carl Leonardsson, Ahmed Rezine:
Memorax, a Precise and Sound Tool for Automatic Fence Insertion under TSO. TACAS 2013: 530-536 - 2012
- [j5]Giorgio Delzanno, Ahmed Rezine:
A lightweight regular model checking approach for parameterized systems. Int. J. Softw. Tools Technol. Transf. 14(2): 207-222 (2012) - [c17]Ying Zhang, Ahmed Rezine, Petru Eles, Zebo Peng:
Automatic Test Program Generation for Out-of-Order Superscalar Processors. Asian Test Symposium 2012: 338-343 - [c16]Ala Berzinji, Lisa Kaati, Ahmed Rezine:
Detecting Key Players in Terrorist Networks. EISIC 2012: 297-302 - [c15]Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Carl Leonardsson, Ahmed Rezine:
Automatic Fence Insertion in Integer Programs via Predicate Abstraction. SAS 2012: 164-180 - [c14]Parosh Aziz Abdulla, Mohamed Faouzi Atig, Yu-Fang Chen, Carl Leonardsson, Ahmed Rezine:
Counter-Example Guided Fence Insertion under TSO. TACAS 2012: 204-219 - [e2]Mohamed Faouzi Atig, Ahmed Rezine:
Proceedings 14th International Workshop on Verification of Infinite-State Systems, Infinity 2012, Paris, France, 27th August 2012. EPTCS 107, 2012 [contents] - [i2]Ahmed Rezine:
Ordered Counter-Abstraction. CoRR abs/1204.0131 (2012) - 2011
- [j4]Parosh Aziz Abdulla, Giorgio Delzanno, Ahmed Rezine:
Automatic Verification of Directory-Based Consistency Protocols with Graph Constraints. Int. J. Found. Comput. Sci. 22(4): 761-782 (2011) - 2010
- [c13]Ahmed Bouajjani, Cezara Dragoi, Constantin Enea, Ahmed Rezine, Mihaela Sighireanu:
Invariant Synthesis for Programs Manipulating Lists with Unbounded Data. CAV 2010: 72-88 - [c12]Parosh Aziz Abdulla, Yu-Fang Chen, Giorgio Delzanno, Frédéric Haziza, Chih-Duo Hong, Ahmed Rezine:
Constrained Monotonic Abstraction: A CEGAR for Parameterized Verification. CONCUR 2010: 86-101 - [e1]Yu-Fang Chen, Ahmed Rezine:
Proceedings 12th International Workshop on Verification of Infinite-State Systems, INFINITY 2010, Singapore, Singapore, 21st September 2010. EPTCS 39, 2010 [contents]
2000 – 2009
- 2009
- [j3]Parosh Aziz Abdulla, Giorgio Delzanno, Ahmed Rezine:
Approximated parameterized verification of infinite-state processes with global conditions. Formal Methods Syst. Des. 34(2): 126-156 (2009) - [j2]Parosh Aziz Abdulla, Giorgio Delzanno, Noomene Ben Henda, Ahmed Rezine:
Monotonic Abstraction: on Efficient Verification of Parameterized Systems. Int. J. Found. Comput. Sci. 20(5): 779-801 (2009) - [c11]Parosh Aziz Abdulla, Giorgio Delzanno, Ahmed Rezine:
Approximated Context-Sensitive Analysis for Parameterized Verification. FMOODS/FORTE 2009: 41-56 - [c10]Parosh Aziz Abdulla, Giorgio Delzanno, Ahmed Rezine:
Automatic Verification of Directory-Based Consistency Protocols. RP 2009: 36-50 - 2008
- [b1]Ahmed Rezine:
Parameterized Systems: Generalizing and Simplifying Automatic Verification. Uppsala University, Sweden, 2008 - [c9]Parosh Aziz Abdulla, Ahmed Bouajjani, Jonathan Cederberg, Frédéric Haziza, Ahmed Rezine:
Monotonic Abstraction for Programs with Dynamic Memory Heaps. CAV 2008: 341-354 - [c8]Parosh Aziz Abdulla, Noomene Ben Henda, Giorgio Delzanno, Frédéric Haziza, Ahmed Rezine:
Parameterized Tree Systems. FORTE 2008: 69-83 - [c7]Parosh Aziz Abdulla, Giorgio Delzanno, Ahmed Rezine:
Monotonic Abstraction in Action. ICTAC 2008: 50-65 - [c6]Parosh Aziz Abdulla, Noomene Ben Henda, Giorgio Delzanno, Ahmed Rezine:
Handling Parameterized Systems with Non-atomic Global Conditions. VMCAI 2008: 22-36 - [c5]Parosh Aziz Abdulla, Giorgio Delzanno, Ahmed Rezine:
Monotonic Abstraction in Parameterized Verification. RP 2008: 3-14 - [i1]Parosh Aziz Abdulla, Ahmed Bouajjani, Jonathan Cederberg, Frédéric Haziza, Ran Ji, Ahmed Rezine:
Shape Analysis via Monotonic Abstraction. Beyond the Finite: New Challenges in Verification and Semistructured Data 2008 - 2007
- [c4]Parosh Aziz Abdulla, Giorgio Delzanno, Ahmed Rezine:
Parameterized Verification of Infinite-State Processes with Global Conditions. CAV 2007: 145-157 - [c3]Parosh Aziz Abdulla, Giorgio Delzanno, Noomene Ben Henda, Ahmed Rezine:
Regular Model Checking Without Transducers (On Efficient Verification of Parameterized Systems). TACAS 2007: 721-736 - 2006
- [j1]Parosh Aziz Abdulla, Axel Legay, Julien d'Orso, Ahmed Rezine:
Tree regular model checking: A simulation-based approach. J. Log. Algebraic Methods Program. 69(1-2): 93-121 (2006) - [c2]Parosh Aziz Abdulla, Bengt Jonsson, Ahmed Rezine, Mayank Saksena:
Proving Liveness by Backwards Reachability. CONCUR 2006: 95-109 - 2005
- [c1]Parosh Aziz Abdulla, Axel Legay, Julien d'Orso, Ahmed Rezine:
Simulation-Based Iteration of Tree Transducers. TACAS 2005: 30-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint