Get my own profile
Public access
View all18 articles
1 article
available
not available
Based on funding mandates
Co-authors
Martin OderskyEPFLVerified email at epfl.ch
Vincent DanosDirecteur de Recherches CNRS Ecole Normale SupérieureVerified email at ens.fr
Ricardo Honorato-ZimmerSchool of Informatics, University of EdinburghVerified email at sms.ed.ac.uk
Nada AminHarvard UniversityVerified email at alum.mit.edu
Gerardo SchneiderProfessor of Computer Science, University of GothenburgVerified email at cse.gu.se
Tiark RompfPurdue UniversityVerified email at purdue.edu
Tobias HeindelTU BerlinVerified email at tu-berlin.de
Christoph KochProfessor of Computer Science, EPFLVerified email at epfl.ch
Amir ShaikhhaUniversity of EdinburghVerified email at ed.ac.uk
Samuel GruetterMITVerified email at mit.edu
Borzoo BonakdarpourAssociate Professor of Computer Science, Michigan State UniversityVerified email at msu.edu
Cesar SanchezAssociate Research Professor, IMDEA Software InstituteVerified email at imdea.org
Aggelos BiboudisOracleVerified email at oracle.com
Heather MillerCarnegie Mellon UniversityVerified email at cs.cmu.edu
Olivier BlanvillainEPFLVerified email at epfl.ch
Sebastián Jaramillo-RiveriUniversity of EdinburghVerified email at sms.ed.ac.uk
Vlad UrechePhD student, LAMP, EPFLVerified email at epfl.ch
Russ HarmerCNRS, LyonVerified email at ens-lyon.fr
Paolo G. GiarrussoFormal Methods Engineer, Bedrock Systems Inc.Verified email at tudelft.nl
Riccardo ScandariatoHead of the Institute of Software Security, Hamburg University of Technology (TUHH)Verified email at tuhh.de