Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jose MeseguerProfessor of Computer Science, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
- Santiago EscobarVRAIN Valencian Research Institute for Artificial Intelligence. Universitat Politècnica de ValènciaVerified email at upv.es
- Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Sasa RadomirovicUniversity of SurreyVerified email at surrey.ac.uk
- Lucca HirschiTenured Inria Researcher @ LoriaVerified email at inria.fr
- Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
- Catherine MeadowsHead, Formal Methods Section, Naval Research LaboratoryVerified email at nrl.navy.mil
- Jorge Toro-PozoETH ZurichVerified email at inf.ethz.ch
- Paliath NarendranUniversity at Albany---SUNYVerified email at albany.edu
- Paweł SzałachowskiVerified email at google.com
- Tiffany Hyun-Jin KimCarnegie Mellon UniversityVerified email at ece.cmu.edu
- Deepak KapurUniversity of New MexicoVerified email at cs.unm.edu
- Christopher LynchClarkson UniversityVerified email at clarkson.edu
- Christoph SprengerSenior researcher at ETH ZurichVerified email at inf.ethz.ch
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Jorden WhitefieldIndependent ResearcherVerified email at jwhitefield.co.uk
- Dennis JacksonMozillaVerified email at mozilla.com
- Helen J. WangPrincipal Researcher, Microsoft ResearchVerified email at microsoft.com
Follow