Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaEmail verificata su cis.upenn.edu
- Steve ZdancewicProfessor of Computer and Information Science, University of PennsylvaniaEmail verificata su cis.upenn.edu
- Cătălin HrițcuTenured Faculty at MPI-SPEmail verificata su mpi-sp.org
- Leonidas LampropoulosAssistant Professor, University of MarylandEmail verificata su umd.edu
- Yao LiPortland State UniversityEmail verificata su pdx.edu
- Yannick ZakowskiInriaEmail verificata su inria.fr
- Paul HeUniversity of PennsylvaniaEmail verificata su cis.upenn.edu
- Chung-Kil HurSeoul National UniversityEmail verificata su sf.snu.ac.kr
- Yishuai LiEngineer II, Alibaba CloudEmail verificata su alibaba-inc.com
- John HughesProfessor of Computer Science and Engineering, Chalmers UniversityEmail verificata su chalmers.se
- William ManskyAssistant Professor, University of Illinois at ChicagoEmail verificata su uic.edu
- Wolf HonoreEmail verificata su yale.edu
- Lennart BeringerPrinceton UniversityEmail verificata su cs.princeton.edu
- Hengchu ZhangUniversity of PennsylvaniaEmail verificata su seas.upenn.edu
- Adam ChlipalaMIT CSAILEmail verificata su csail.mit.edu
- Meng WangReader in Computer Science, University of BristolEmail verificata su bristol.ac.uk
- Dominic OrchardSchool of Computing, University of Kent and Computer Laboratory, University of CambridgeEmail verificata su kent.ac.uk
- Stephanie WeirichProfessor of Computer Science, University of PennsylvaniaEmail verificata su cis.upenn.edu
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Email verificata su ens.fr