Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Harald SøndergaardComputing and Information Systems, The University of MelbourneEmail verificata su unimelb.edu.au
- Peter StuckeyFaculty of Information Technology, Monash UniversityEmail verificata su monash.edu
- Graeme GangeMonash UniversityEmail verificata su monash.edu
- Jorge A NavasCertoraEmail verificata su certora.com
- Fergus HendersonGoogleEmail verificata su google.com
- Kim MarriottProfessor, Monash UniversityEmail verificata su monash.edu
- Roberto AmadiniUniversity of BolognaEmail verificata su unibo.it
- Thomas ConwayMurdoch Children Research InstituteEmail verificata su mcri.edu.au
- Vanessa TeagueThinking Cybersecurity and The Australian National UniversityEmail verificata su anu.edu.au
- Bishoksan KafleResearch Fellow, The University of Melbourne, AustraliaEmail verificata su unimelb.edu.au
- Alexander JordanOracle LabsEmail verificata su oracle.com
- François GauthierSenior Principal Researcher, Oracle LabsEmail verificata su oracle.com
- R JefferyUNSWEmail verificata su cse.unsw.edu.au
- Roberto BagnaraDepartment of Mathematical, Physical and Computer Sciences - University of Parma, ItalyEmail verificata su cs.unipr.it
- Nataliia (Pobiedina) RümmeleSiemens AGEmail verificata su siemens.com
- Paul BoneNo affiliationEmail verificata su bone.id.au
- John P GallagherRoskilde UniversityEmail verificata su ruc.dk
- Georges SaabOracle CorporationEmail verificata su oracle.com
- Maria Garcia de la BandaFaculty of Information Technology, Monash UniversityEmail verificata su monash.edu
- bart demoenProfessor of Computer Science, KU LeuvenEmail verificata su cs.kuleuven.be
Segui
Peter Schachte
School of Computing and Information Systems, University of Melbourne
Email verificata su unimelb.edu.au - Home page