Crea il mio profilo
Accesso pubblico
Visualizza tutto43 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Somesh JhaLubar Chair of Computer Science, University of WisconsinEmail verificata su cs.wisc.edu
- Orna GrumbergProfessor of Computer Science, TechnionEmail verificata su cs.technion.ac.il
- Andreas HolzerUniversity of TorontoEmail verificata su cs.toronto.edu
- Christian SchallhartGoogleEmail verificata su schallhart.net
- Igor KonnovIndependent Security and Formal Methods ResearcherEmail verificata su konnov.phd
- Johannes KinderProfessor of Computer Science, LMU MunichEmail verificata su lmu.de
- Roderick BloemGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Thomas HenzingerIST AustriaEmail verificata su ist.ac.at
- Michael TautschnigQueen Mary University of LondonEmail verificata su qmul.ac.uk
- Georg GottlobProfessor of Informatics, University of CalabriaEmail verificata su unical.it
- Tomer KotekTU WienEmail verificata su forsyte.at
- Ayrat KhalimovTU ClausthalEmail verificata su tu-clausthal.de
- Nicola LeoneUniversity of Calabria, Professor of Computer ScienceEmail verificata su unical.it
- Mihai ChristodorescuGoogleEmail verificata su christodorescu.org
- Thomas EiterVienna University of Technology (TU Wien)Email verificata su kr.tuwien.ac.at
- Natasha SharyginaProfessor of Computer Science, Universita della Svizzera Italiana (USI), Lugano, SwitzerlandEmail verificata su usi.ch
- Erich GrädelRWTH Aachen UniversityEmail verificata su logic.rwth-aachen.de
- Alex GroceAssociate Professor of Computer Science, Northern Arizona UniversityEmail verificata su nau.edu
- Armin BiereProfessor of Computer Science, University of FreiburgEmail verificata su informatik.uni-freiburg.de
- Andreas FröhlichJKU LinzEmail verificata su jku.at
Segui
Helmut Veith
Professor of Computer Science, Vienna University of Technology / TU Wien
Email verificata su forsyte.tuwien.ac.at - Home page