Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Peter MüllerETH ZurichEmail verificata su inf.ethz.ch
- Gary T. LeavensProfessor, University of Central FloridaEmail verificata su cs.ucf.edu
- Ina SchaeferKarlsruhe Institute of Technology (KIT)Email verificata su kit.edu
- Susan EisenbachProfessor Emeritus of Computing, Imperial College LondonEmail verificata su imperial.ac.uk
- Annette BieniusaUniversity of Kaiserslautern-Landau (RPTU)Email verificata su cs.uni-kl.de
- Sophia DrossopoulouProfessor, Imperial College LondonEmail verificata su imperial.ac.uk
- Peter ZellerTU Kaiserslautern, AG SoftwaretechnikEmail verificata su cs.uni-kl.de
- Erik PollRadboud University NijmegenEmail verificata su cs.ru.nl
- Jan Olaf BlechAalto UniversityEmail verificata su aalto.fi
- Mooly SagivTel Aviv UniversityEmail verificata su acm.org
- Yunhong ZhouYahoo LabsEmail verificata su yahooinc.com
- Mario TrappFraunhoferEmail verificata su iks.fraunhofer.de
- Eran YahavTechnion, IsraelEmail verificata su cs.technion.ac.il
- Ganesan RamalingamMicrosoft Research IndiaEmail verificata su microsoft.com
- Noam RinetzkyAssistant Professor of Computer Science, Tel Aviv UniversityEmail verificata su cs.tau.ac.il
- Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenEmail verificata su cs.ru.nl
- Norbert WehnUniversity of KaiserslauternEmail verificata su eit.uni-kl.de
- Werner DietlElectrical and Computer Engineering, University of WaterlooEmail verificata su uwaterloo.ca
- Davide SangiorgiProfessor of Computer Science, University of BolognaEmail verificata su cs.unibo.it
Segui
Arnd Poetzsch-Heffter
Professor für Informatik, University of Kaiserslautern-Landau
Email verificata su cs.uni-kl.de