Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mike RaineyCarnegie Mellon UniversityEmail verificata su mike-rainey.site
- Umut A. AcarCarnegie Mellon University, Department of Computer ScienceEmail verificata su cs.cmu.edu
- François PottierInria ParisEmail verificata su inria.fr
- Alan SchmittInria, IRISAEmail verificata su inria.fr
- Martin BodinInriaEmail verificata su ens-lyon.org
- Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaEmail verificata su cis.upenn.edu
- Stephanie WeirichProfessor of Computer Science, University of PennsylvaniaEmail verificata su cis.upenn.edu
- Jacques-Henri JourdanCNRS, Laboratoire Méthodes FormellesEmail verificata su normalesup.org
- Mário PereiraAssistant Professor, NOVA School of Science and TechnologyEmail verificata su fct.unl.pt
- Jean-Christophe FilliâtreCNRSEmail verificata su lri.fr
- Philippa GardnerProfessor of Theoretical Computer Science, Imperial College LondonEmail verificata su imperial.ac.uk
- Sergio MaffeisSenior Lecturer (Associate Professor) in Computer Security, Imperial College LondonEmail verificata su doc.ic.ac.uk
- Robbert KrebbersAssociate Professor, Radboud University NijmegenEmail verificata su cs.ru.nl
- Amin TimanyAarhus UniversityEmail verificata su cs.au.dk
- Joseph TassarottiAssistant Professor, New York UniversityEmail verificata su nyu.edu
- Derek DreyerMax Planck Institute for Software Systems (MPI-SWS), Saarland Informatics CampusEmail verificata su mpi-sws.org
- Ralf JungAssistant Professor, ETH ZürichEmail verificata su inf.ethz.ch
- Filip SieczkowskiHeriot-Watt UniversityEmail verificata su hw.ac.uk
- Alexandre MoineInria ParisEmail verificata su inria.fr
- Samuel GruetterMITEmail verificata su mit.edu