Crea il mio profilo
Accesso pubblico
Visualizza tutto40 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ufuk TopcuThe University of Texas at AustinEmail verificata su utexas.edu
- Roderick BloemGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Hadas Kress-GazitCornell UniversityEmail verificata su cornell.edu
- Bettina KönighoferAssistant Professor, Graz University of Technology, AustriaEmail verificata su iaik.tugraz.at
- Robert KönighoferGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Hans-Jörg PeterSiemens EDAEmail verificata su siemens.com
- Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Stéphane LafortuneProfessor of Electrical Engineering and Computer Science, University of Michigan, USAEmail verificata su umich.edu
- Scott NiekumAssociate Professor, University of Massachusetts AmherstEmail verificata su cs.umass.edu
- Mohammed AlshiekhResearcher at University of Texas at AustinEmail verificata su utexas.edu
- Vasumathi RamanEmail verificata su cds.caltech.edu
- Stavros TripakisAssociate Professor, Northeastern UniversityEmail verificata su northeastern.edu
- Moshe Y. VardiRice UniversityEmail verificata su cs.rice.edu
- Michael GerkeSchloss Dagstuhl - Leibniz-Zentrum für InformatikEmail verificata su dagstuhl.de
- Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusEmail verificata su cispa.saarland
- Robert MattmüllerUniversity of Freiburg, GermanyEmail verificata su robert-mattmueller.de
- Kai Weng Wong (Catherine Wong)Cornell UniversityEmail verificata su cornell.edu
- Min WenGoogleEmail verificata su google.com
- Leander TentrupSaarland University, Saarland Informatics CampusEmail verificata su cs.uni-saarland.de
- Adam WalkerNICTA/UNSWEmail verificata su nicta.com.au