Get my own profile
Public access
View all16 articles
1 article
available
not available
Based on funding mandates
Co-authors
Harald SøndergaardComputing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Peter StuckeyFaculty of Information Technology, Monash UniversityVerified email at monash.edu
Graeme GangeMonash UniversityVerified email at monash.edu
Jorge A NavasCertoraVerified email at certora.com
Kim MarriottProfessor, Monash UniversityVerified email at monash.edu
Fergus HendersonGoogleVerified email at google.com
Thomas ConwayMurdoch Children Research InstituteVerified email at mcri.edu.au
Roberto AmadiniUniversity of BolognaVerified email at unibo.it
Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
Bishoksan KafleResearch Fellow, The University of Melbourne, AustraliaVerified email at unimelb.edu.au
Alexander JordanOracle LabsVerified email at oracle.com
François GauthierConsulting Researcher, Oracle LabsVerified email at oracle.com
Roberto BagnaraDepartment of Mathematical, Physical and Computer Sciences - University of Parma, ItalyVerified email at cs.unipr.it
Georges SaabOracle CorporationVerified email at oracle.com
Paul BoneNo affiliationVerified email at bone.id.au
Nataliia (Pobiedina) RümmeleSiemens AGVerified email at siemens.com
Maria Garcia de la BandaProfessor, Faculty of Information Technology, Monash UniversityVerified email at monash.edu
bart demoenProfessor of Computer Science, KU LeuvenVerified email at cs.kuleuven.be
John P GallagherRoskilde UniversityVerified email at ruc.dk
Peter RossNapier UniversityVerified email at napier.ac.uk
Follow
Peter Schachte
School of Computing and Information Systems, University of Melbourne
Verified email at unimelb.edu.au - Homepage