Get my own profile
Public access
View all40 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Jasmin BlanchetteLudwig-Maximilians-Universität MünchenVerified email at ifi.lmu.de
Dmitriy TraytelUniversity of CopenhagenVerified email at di.ku.dk
Johannes HölzlVerified email at in.tum.de
Tobias NipkowProfessor of Computer Science, Technische Universität MünchenVerified email at in.tum.de
Franco RaimondiProfessor of Computer Science, Gran Sasso Science InstituteVerified email at gssi.it
Elsa L GunterResearch Associate Professor, University of Illinois at Urbana - ChampaignVerified email at illinois.edu
Grigore RosuUniversity of Illinois at Urbana ChampaignVerified email at illinois.edu
Nicholas SmallboneChalmers University of TechnologyVerified email at chalmers.se
Daniel GAINAInstitute of Mathematics for Industry, Kyushu UniversityVerified email at imi.kyushu-u.ac.jp
Traian Florin ȘerbănuțăUniversity of BucharestVerified email at unibuc.ro
Ioana LeusteanProfessor, University of BucharestVerified email at fmi.unibuc.ro
Markus N RabeAugmentVerified email at augmentcode.com
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Dieter HutterGerman Research Center for Artificial IntelligenceVerified email at dfki.de
Helmut SeidlProfessor für Informatik, School of CIT, TU MünchenVerified email at in.tum.de
Christian HammerProfessor of Computer Science at University of PassauVerified email at uni-passau.de
Jaap BoenderFormal Verification Engineer, Hensoldt Cyber GmbHVerified email at kerguelen.org