Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jose MeseguerProfessor of Computer Science, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Santiago EscobarVRAIN Valencian Research Institute for Artificial Intelligence. Universitat Politčcnica de ValčnciaVerified email at upv.es
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Sasa RadomirovicUniversity of SurreyVerified email at surrey.ac.uk
Lucca HirschiTenured Inria Researcher @ LoriaVerified email at inria.fr
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Catherine MeadowsHead, Formal Methods Section, Naval Research LaboratoryVerified email at nrl.navy.mil
Jorge Toro-PozoETH ZurichVerified email at inf.ethz.ch
Paliath NarendranUniversity at Albany---SUNYVerified email at albany.edu
Paweł SzałachowskiVerified email at google.com
Tiffany Hyun-Jin KimCarnegie Mellon UniversityVerified email at ece.cmu.edu
Deepak KapurUniversity of New MexicoVerified email at cs.unm.edu
Christopher LynchClarkson UniversityVerified email at clarkson.edu
Christoph SprengerSenior researcher at ETH ZurichVerified email at inf.ethz.ch
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Jorden WhitefieldIndependent ResearcherVerified email at jwhitefield.co.uk
Dennis JacksonMozillaVerified email at mozilla.com
Helen J. WangPrincipal Researcher, Microsoft ResearchVerified email at microsoft.com
Follow