Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Alexander J. SummersThe University of British ColumbiaVerified email at ubc.ca
Arnd Poetzsch-HeffterProfessor für Informatik, RPTU University Kaiserslautern-LandauVerified email at rptu.de
Gary T. LeavensProfessor, University of Central FloridaVerified email at cs.ucf.edu
Werner DietlElectrical and Computer Engineering, University of WaterlooVerified email at uwaterloo.ca
David BasinProfessor of Computer Science, ETH Zurich; Affiliated Faculty, INSAIT, Sofia UniversityVerified email at inf.ethz.ch
Malte SchwerhoffLecturer Computer Science, ETH ZurichVerified email at inf.ethz.ch
Sophia DrossopoulouProfessor, Imperial College LondonVerified email at imperial.ac.uk
Marco EilersPostdoc at ETH ZurichVerified email at inf.ethz.ch
Maria ChristakisProfessor @ TU Wien InformaticsVerified email at tuwien.ac.at
Valentin WüstholzDiligence SecurityVerified email at diligence.security
Felix A. WolfETH ZürichVerified email at inf.ethz.ch
Thibault DardinierEPFLVerified email at epfl.ch
Aurea BíláPhD Student, ETH ZurichVerified email at inf.ethz.ch
Federico PoliPhD, ETH ZurichVerified email at inf.ethz.ch
Linard ArquintResearch Fellow, NUSVerified email at nus.edu.sg
João Carlos PereiraDoctoral student, ETH ZurichVerified email at inf.ethz.ch
Dimitar AsenovGoogleVerified email at google.com
Christoph MathejaProfessor of Theory of Correct Systems, University of OldenburgVerified email at uol.de
Ioannis T. KassiosThe Trade DeskVerified email at google.com
Martin NordioETH ZurichVerified email at inf.ethz.ch