Crea il mio profilo
Accesso pubblico
Visualizza tutto30 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Roderick BloemGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Ayrat KhalimovTU ClausthalEmail verificata su tu-clausthal.de
- Sasha RubinUniversity of SydneyEmail verificata su sydney.edu.au
- Viorica Sofronie-StokkermansProfessor, University of KoblenzEmail verificata su uni-koblenz.de
- Helmut VeithProfessor of Computer Science, Vienna University of Technology / TU WienEmail verificata su forsyte.tuwien.ac.at
- Josef WidderInformal SystemsEmail verificata su informal.systems
- Leander TentrupSaarland University, Saarland Informatics CampusEmail verificata su cs.uni-saarland.de
- Guillermo A. PérezAssociate Professor, University of AntwerpEmail verificata su uantwerp.be
- Robert KönighoferGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Igor KonnovIndependent Security and Formal Methods ResearcherEmail verificata su konnov.phd
- Mouhammad SakrPostdoctoral Researcher, CritiX, Luxembourg UniversityEmail verificata su uni.lu
- Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Jean-François RaskinUniversité Libre de Bruxelles, U.L.B.Email verificata su ulb.ac.be
- Ocan SankurCNRS, Université de RennesEmail verificata su irisa.fr
- Roopsha SamantaAssistant Professor, Purdue UniversityEmail verificata su purdue.edu
- Adam WalkerNICTA/UNSWEmail verificata su nicta.com.au
- Romain BrenguierUniversity of OxfordEmail verificata su cs.ox.ac.uk
- Milind KulkarniAssociate Professor of Electrical and Computer Engineering, Purdue UniversityEmail verificata su purdue.edu
- Viktor KunčakEPFLEmail verificata su epfl.ch
- Christopher WagnerPurdue UniversityEmail verificata su purdue.edu