Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mike RaineyCarnegie Mellon UniversityVerified email at mike-rainey.site
Umut A. AcarCarnegie Mellon University, Department of Computer ScienceVerified email at cs.cmu.edu
François PottierInria ParisVerified email at inria.fr
Martin BodinInriaVerified email at ens-lyon.org
Jacques-Henri JourdanCNRS, Laboratoire Méthodes FormellesVerified email at cnrs.fr
Alan SchmittInria, IRISAVerified email at inria.fr
Mário PereiraAssistant Professor, NOVA School of Science and TechnologyVerified email at fct.unl.pt
Jean-Christophe FilliâtreCNRSVerified email at lri.fr
Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Stephanie WeirichProfessor of Computer Science, University of PennsylvaniaVerified email at cis.upenn.edu
Philippa GardnerProfessor of Theoretical Computer Science, Imperial College LondonVerified email at imperial.ac.uk
Sergio MaffeisSenior Lecturer (Associate Professor) in Computer Security, Imperial College LondonVerified email at doc.ic.ac.uk
Robbert KrebbersAssociate Professor, Radboud University NijmegenVerified email at cs.ru.nl
Amin TimanyAarhus UniversityVerified email at cs.au.dk
Joseph TassarottiAssistant Professor, New York UniversityVerified email at nyu.edu
Derek DreyerMax Planck Institute for Software Systems (MPI-SWS), Saarland Informatics CampusVerified email at mpi-sws.org
Ralf JungAssistant Professor, ETH ZürichVerified email at inf.ethz.ch
Filip SieczkowskiHeriot-Watt UniversityVerified email at hw.ac.uk
Alexandre MoineNew York UniversityVerified email at nyu.edu
Samuel GruetterMITVerified email at mit.edu