Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Daniel NeiderTU Dortmund University and Center for Trustworthy Data Science and SecurityEmail verificata su tu-dortmund.de
- Jean-Raphaël GaglionePh.D. StudentEmail verificata su utexas.edu
- Zhe XuAssistant Professor, Arizona State UniversityEmail verificata su asu.edu
- Ufuk TopcuThe University of Texas at AustinEmail verificata su utexas.edu
- Benedikt BolligCNRS, LMF, ENS Paris-Saclay, Université Paris-SaclayEmail verificata su lsv.ens-cachan.fr
- Lina YEUniversité Paris-Saclay, CentraleSupélec, LRIEmail verificata su centralesupelec.fr
- Benoît BarbotLACL, Université Paris-Est CréteilEmail verificata su lacl.fr
- Martin LeuckerProfessor of Computer Science, University of LübeckEmail verificata su isp.uni-luebeck.de
- Serge HaddadProfessor of Computer Science, ENS Paris-SaclayEmail verificata su lsv.fr
- Alain FinkelLSV ENS Paris SaclayEmail verificata su lsv.fr
- Nathanaël FijalkowCNRS, LaBRI, Bordeaux, and University of WarsawEmail verificata su labri.fr
- Ritam RahaPost-doctoral Researcher, Max Planck Institute for Software Systems (MPI-SWS)Email verificata su mpi-sws.org
- Xuan XieUniversity of AlbertaEmail verificata su ualberta.ca
- Dana FismanAssociate Professor of Computer Science, Ben-Gurion UniversityEmail verificata su cs.bgu.ac.il
- Emmanuel MüllerProfessor of Computer Science, Technical University of DortmundEmail verificata su cs.tu-dortmund.de
- Benedikt BöingTU DortmundEmail verificata su cs.tu-dortmund.de
- Madhavan MukundChennai Mathematical InstituteEmail verificata su cmi.ac.in
- Ahmed BouajjaniProfessor Computer Science, Université Paris CitéEmail verificata su irif.fr