Crea il mio profilo
Accesso pubblico
Visualizza tutto39 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jasmin BlanchetteLudwig-Maximilians-Universität MünchenEmail verificata su ifi.lmu.de
- Dmitriy TraytelUniversity of CopenhagenEmail verificata su di.ku.dk
- Johannes HölzlEmail verificata su in.tum.de
- Tobias NipkowProfessor of Computer Science, Technische Universität MünchenEmail verificata su in.tum.de
- Franco RaimondiProfessor of Computer Science, Gran Sasso Science InstituteEmail verificata su gssi.it
- Elsa L GunterResearch Associate Professor, University of Illinois at Urbana - ChampaignEmail verificata su illinois.edu
- Grigore RosuUniversity of Illinois at Urbana ChampaignEmail verificata su illinois.edu
- Nicholas SmallboneChalmers University of TechnologyEmail verificata su chalmers.se
- Daniel GAINAInstitute of Mathematics for Industry, Kyushu UniversityEmail verificata su imi.kyushu-u.ac.jp
- Traian Florin ȘerbănuțăUniversity of BucharestEmail verificata su unibuc.ro
- Ioana LeusteanProfessor, University of BucharestEmail verificata su fmi.unibuc.ro
- Markus N RabeAugmentEmail verificata su augmentcode.com
- Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Dieter HutterGerman Research Center for Artificial IntelligenceEmail verificata su dfki.de
- Helmut SeidlProfessor für Informatik, School of CIT, TU MünchenEmail verificata su in.tum.de
- Christian HammerProfessor of Computer Science at University of PassauEmail verificata su uni-passau.de
- Jaap BoenderFormal Verification Engineer, Hensoldt Cyber GmbHEmail verificata su kerguelen.org