Get my own profile
Public access
View all61 articles
4 articles
available
not available
Based on funding mandates
Co-authors
John DerrickUniversity of SheffieldVerified email at sheffield.ac.uk
Heike WehrheimUniversity of OldenburgVerified email at uni-oldenburg.de
Ian James HayesEmeritus Professor, The University of QueenslandVerified email at uq.edu.au
Simon DohertyUniversity of SheffieldVerified email at sheffield.ac.ukSadegh DalvandiPrincipal Formal Verification Engineer at AxiomiseVerified email at dalvandi.com
Ori LahavTel Aviv UniversityVerified email at tau.ac.il
Graeme SmithThe University of QueenslandVerified email at itee.uq.edu.au
Azalea RaadImperial College LondonVerified email at imperial.ac.uk
Georg StruthUniversity of SheffieldVerified email at sheffield.ac.ukJohn WickersonImperial College LondonVerified email at imperial.ac.uk
Matt GriffinPhD ResearcherVerified email at surrey.ac.uk
Oleg TravkinPhD Student, Universität PaderbornVerified email at zitmail.uni-paderborn.deJim WoodcockProfessor of Software Engineering, University of YorkVerified email at york.ac.uk
Peter Gorm LarsenAarhus UniversityVerified email at ece.au.dk
Tomas KulikSecurity and Formal Methods evangelist, Sweet GeeksVerified email at sweetgeeks.dk
Hugo Daniel MacedoAarhus UniversityVerified email at ece.au.dk
Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Tsz Yiu LamBrunel University LondonVerified email at alumni.brunel.ac.ukVictor GomesResearch Associate, University of CambridgeVerified email at cl.cam.ac.uk
Radha JagadeesanProfessor. School of Computing.Verified email at depaul.edu