Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- David BrumleyComputer Science, Carnegie Mellon UniversityEmail verificata su cmu.edu
- Thanassis AvgerinosUniversity of AthensEmail verificata su di.uoa.gr
- Maverick WooSystems Scientist, Carnegie Mellon UniversityEmail verificata su cmu.edu
- Sang Kil ChaSchool of Computing, KAISTEmail verificata su kaist.ac.kr
- Claire Le GouesCarnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Jeremy LacomisPostdoctoral Fellow, Carnegie Mellon UniversityEmail verificata su cmu.edu
- Bogdan VasilescuAssociate Professor at Carnegie Mellon UniversityEmail verificata su cmu.edu
- Choongwoo HanMicrosoftEmail verificata su microsoft.com
- Manuel EgeleBoston UniversityEmail verificata su bu.edu
- Valentin J.M. ManèsInformation Security ResearcherEmail verificata su kaist.ac.kr
- HyungSeok HanGeorgia TechEmail verificata su gatech.edu
- Graham NeubigCarnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Stephanie Elzer SchwartzMillersville UniversityEmail verificata su millersville.edu
- Pengcheng YinGoogle DeepmindEmail verificata su google.com
- Miltiadis AllamanisGoogle DeepMindEmail verificata su google.com
- Qibin ChenApple AI/MLEmail verificata su apple.com
- Ipek OzkayaCarnegie Mellon University Software Engineering InstituteEmail verificata su sei.cmu.edu
- Forrest ShullCarnegie Mellon University, Software Engineering InstituteEmail verificata su computer.org
- Jorge A NavasCertoraEmail verificata su certora.com
- Arie GurfinkelUniversity of WaterlooEmail verificata su uwaterloo.ca