Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
Armin BiereProfessor of Computer Science, University of FreiburgVerified email at informatik.uni-freiburg.de
Klaus HavelundSenior Research Scientist, Jet Propulsion LaboratoryVerified email at jpl.nasa.gov
Lei MaAssociate Professor, The University of Tokyo, Japan & University of Alberta, CanadaVerified email at acm.org
Kuniyasu SuzakiIISEC: Institute of Information Security, Graduate SchoolVerified email at iisec.ac.jp
Takashi KitamuraAISTVerified email at aist.go.jp
Eun-Hye ChoiAISTVerified email at aist.go.jp
Willem VisserComputer Science Division, Stellenbosch UniversityVerified email at cs.sun.ac.za
Corina PasareanuCMU/NASA AmesVerified email at nasa.gov
Rudolf RamlerSoftware Competence Center Hagenberg GmbH (SCCH)Verified email at scch.at
Shinichi HonidenNational Institute of Informatics / Waseda UniversityVerified email at nii.ac.jp
Cheng ZhangPost-doctoral research fellow, University of WaterlooVerified email at uwaterloo.ca
Martina SeidlUniv.-Prof., JKU LinzVerified email at jku.at
Grigore RosuUniversity of Illinois at Urbana ChampaignVerified email at illinois.edu
Rich WashingtonGoogleVerified email at google.com
Yoriyuki YamagataSenior Researcher, National Institute of Advanced Industrial Science and Technology (AIST)Verified email at aist.go.jp
Mojtaba EshghiePhD Student at KTH Royal Institute of TechnologyVerified email at kth.se
Ye liuResearch Scientist of Singapore Management University; Nanyang Technological University;Verified email at smu.edu.sg
Yi LiNanyang Technological UniversityVerified email at ntu.edu.sg
Koushik SenProfessor of Computer Science, University of California, BerkeleyVerified email at cs.berkeley.edu
Peter Csaba OlveczkyProfessor of Computer Science, University of OsloVerified email at ifi.uio.no