Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
James RielyProfessor of Computing, DePaul UniversityVerified email at cs.depaul.edu
Radha JagadeesanVerified email at cs.depaul.edu
Andrew D GordonMicrosoft Research and University of EdinburghVerified email at microsoft.com
Julian RathkeUniversity of SouthamptonVerified email at ecs.soton.ac.uk
Corin PitcherAssociate Professor of Computer Science, DePaul UniversityVerified email at cdm.depaul.edu
matthew hennessyProfessor of Computer ScienceVerified email at cs.tcd.ie
Ian WakemanUniversity of SussexVerified email at sussex.ac.uk
Glenn BrunsCalifornia State University Monterey BayVerified email at csumb.edu
Michael BenediktProfessor of Computer Science, Oxford UniversityVerified email at cs.ox.ac.uk
Guy LeducProfessor of Computer Science, Université de Liège, Montefiore Institute, BelgiumVerified email at ulg.ac.be
William FerreiraUCLVerified email at ucl.ac.uk
Luca AcetoDepartment of Computer Science, Reykjavik University, and Gran Sasso Science Institute, L'AquilaVerified email at ru.is
Steve SchneiderDirector of Surrey Centre for Cyber Security; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Frits W. VaandragerProfessor of Computer Science, Radboud UniversityVerified email at cs.ru.nl
Craig DisselkoenUC San DiegoVerified email at cs.ucsd.edu
Mihaela SighireanuAssociate Professor in Computer Science, IRIF, Université de ParisVerified email at irif.fr
Peter F. Patel-SchneiderPARCVerified email at parc.com
Frank MittelbachLaTeX ProjectVerified email at latex-project.org
Peter J. DanielsenVerified email at uwalumni.com
Cormac FlanaganProfessor of Computer Science, University of California Santa CruzVerified email at ucsc.edu