Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
Barbara JobstmannScientist at EPFLVerified email at epfl.ch
Alessio R LomuscioImperial College LondonVerified email at imperial.ac.uk
axel legayUCLouvainVerified email at uclouvain.be
Saddek BensalemUniversité Grenoble Alpes, VERIMAGVerified email at univ-grenoble-alpes.fr
Byron CookProfessor of Computer Science, UCL, AmazonVerified email at cs.ucl.ac.uk
Frank de BoerLeader research group Formal Methods at Centrum Wiskunde & Informatica and prof. Leiden Univ.Verified email at cwi.nl
Joseph SifakisReseracher at Verimag laboratory, GrenobleVerified email at imag.fr
Charles MorissetSenior Lecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Doron A. PeledProfessor Of Computer Science, Bar Ilan UniversityVerified email at cs.biu.ac.il