Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Martin OderskyEPFLVerified email at epfl.ch
- Vincent DanosDirecteur de Recherches CNRS Ecole Normale SupérieureVerified email at ens.fr
- Ricardo Honorato-ZimmerSchool of Informatics, University of EdinburghVerified email at sms.ed.ac.uk
- Gerardo SchneiderProfessor of Computer Science, University of GothenburgVerified email at cse.gu.se
- Nada AminHarvard UniversityVerified email at alum.mit.edu
- Tiark RompfPurdue UniversityVerified email at purdue.edu
- Tobias HeindelTU BerlinVerified email at tu-berlin.de
- Christoph KochProfessor of Computer Science, EPFLVerified email at epfl.ch
- Samuel GruetterMITVerified email at mit.edu
- Borzoo BonakdarpourAssociate Professor of Computer Science, Michigan State UniversityVerified email at msu.edu
- Cesar SanchezResearch Professor, IMDEA Software InstituteVerified email at imdea.org
- Amir ShaikhhaUniversity of EdinburghVerified email at ed.ac.uk
- Aggelos BiboudisOracleVerified email at oracle.com
- Heather MillerCarnegie Mellon UniversityVerified email at cs.cmu.edu
- Olivier BlanvillainEPFLVerified email at epfl.ch
- Vlad UrechePhD student, LAMP, EPFLVerified email at epfl.ch
- Russ HarmerCNRS, LyonVerified email at ens-lyon.fr
- Riccardo ScandariatoHead of the Institute of Software Security, Hamburg University of Technology (TUHH)Verified email at tuhh.de
- Katja TumaAssistant Professor at the Vrije Universiteit AmsterdamVerified email at vu.nl
- Paolo G. GiarrussoFormal Methods Engineer, Bedrock Systems Inc.Verified email at tudelft.nl