Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
James RielyProfessor of Computing, DePaul UniversityVerified email at cs.depaul.edu
Radha JagadeesanVerified email at cs.depaul.edu
Andrew D GordonMicrosoft Research and University of EdinburghVerified email at microsoft.com
Julian RathkeUniversity of SouthamptonVerified email at ecs.soton.ac.uk
Corin PitcherAssociate Professor of Computer Science, DePaul UniversityVerified email at cdm.depaul.edu
matthew hennessyProfessor of Computer ScienceVerified email at cs.tcd.ie
Ian WakemanUniversity of SussexVerified email at sussex.ac.uk
William FerreiraUCLVerified email at ucl.ac.uk
Michael BenediktProfessor of Computer Science, Oxford UniversityVerified email at cs.ox.ac.uk
Guy LeducProfessor of Computer Science, Université de Liège, Montefiore Institute, BelgiumVerified email at ulg.ac.be
Luca AcetoDepartment of Computer Science, Reykjavik University, and Gran Sasso Science Institute, L'AquilaVerified email at ru.is
Steve SchneiderDirector of Surrey Centre for Cyber Security; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Frits W. VaandragerProfessor of Computer Science, Radboud UniversityVerified email at cs.ru.nl
Glenn BrunsCalifornia State University Monterey BayVerified email at csumb.edu
Craig DisselkoenUC San DiegoVerified email at cs.ucsd.edu
Mihaela SighireanuAssociate Professor in Computer Science, IRIF, Université de ParisVerified email at irif.fr
Peter F. Patel-SchneiderPARCVerified email at parc.com
Frank MittelbachLaTeX ProjectVerified email at latex-project.org
Cormac FlanaganProfessor of Computer Science, University of California Santa CruzVerified email at ucsc.edu
Tim DisneyUniversity of California Santa CruzVerified email at ucsc.edu