Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mike RaineyCarnegie Mellon UniversityVerified email at mike-rainey.site
- Umut A. AcarCarnegie Mellon University, Department of Computer ScienceVerified email at cs.cmu.edu
- François PottierInria ParisVerified email at inria.fr
- Jacques-Henri JourdanCNRS, Laboratoire Méthodes FormellesVerified email at cnrs.fr
- Alan SchmittInria, IRISAVerified email at inria.fr
- Martin BodinInriaVerified email at ens-lyon.org
- Mário PereiraAssistant Professor, NOVA School of Science and TechnologyVerified email at fct.unl.pt
- Jean-Christophe FilliâtreCNRSVerified email at lri.fr
- Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Stephanie WeirichProfessor of Computer Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Philippa GardnerProfessor of Theoretical Computer Science, Imperial College LondonVerified email at imperial.ac.uk
- Sergio MaffeisSenior Lecturer (Associate Professor) in Computer Security, Imperial College LondonVerified email at doc.ic.ac.uk
- Robbert KrebbersAssociate Professor, Radboud University NijmegenVerified email at cs.ru.nl
- Amin TimanyAarhus UniversityVerified email at cs.au.dk
- Joseph TassarottiAssistant Professor, New York UniversityVerified email at nyu.edu
- Derek DreyerMax Planck Institute for Software Systems (MPI-SWS), Saarland Informatics CampusVerified email at mpi-sws.org
- Ralf JungAssistant Professor, ETH ZürichVerified email at inf.ethz.ch
- Filip SieczkowskiHeriot-Watt UniversityVerified email at hw.ac.uk
- Alexandre MoineNew York UniversityVerified email at nyu.edu
- Samuel GruetterMITVerified email at mit.edu