Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Frank TipProfessor, Northeastern UniversityEmail verificata su northeastern.edu
- Oege de MoorProfessor of Computer Science, University of OxfordEmail verificata su cs.ox.ac.uk
- Manu SridharanProfessor, Computer Science and Engineering, University of California, RiversideEmail verificata su sridharan.net
- Julian DolbyIBM Thomas J. Watson Research CenterEmail verificata su us.ibm.com
- Todd MillsteinProfessor of Computer Science, UCLAEmail verificata su cs.ucla.edu
- Arthur BaarsEmail verificata su cs.uu.nl
- Asger FeldthausPh.D. Student of Computer ScienceEmail verificata su cs.au.dk
- Anders MøllerProfessor, Aarhus UniversityEmail verificata su cs.au.dk
- Emina TorlakAmazon Web Services, University of WashingtonEmail verificata su alum.mit.edu
- Satish ChandraGoogleEmail verificata su acm.org
- Hesam SamimiProgramming Languages Researcher, Viewpoints Research InstituteEmail verificata su cs.ucla.edu
- Shay ArtziAmazonEmail verificata su amazon.com
- Michael PradelProfessor of Computer Science, Head of Software Lab, University of StuttgartEmail verificata su iste.uni-stuttgart.de
- Ellen ArtecaAndroid security engineer, GoogleEmail verificata su google.com
- Michael Peyton JonesIOHKEmail verificata su michaelpj.com
- Martin VechevFull Professor of Computer Science, ETH Zurich; Scientific Director, INSAIT;Email verificata su inf.ethz.ch
- Veselin RaychevETH ZurichEmail verificata su inf.ethz.ch
- Cristian-Alexandru StaicuCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Martin Toldam TorpAarhus UniversityEmail verificata su cs.au.dk
- Greg LavenderChief Technology Officer, IntelEmail verificata su intel.com