Get my own profile
Public access
View all29 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Anuj DawarUniversity of CambridgeVerified email at cl.cam.ac.uk
Phokion KolaitisDistinguished Research Professor, UC Santa Cuz and Principal Research Staff Member, IBM ResearchVerified email at ucsc.edu
Martin GroheProfessor of Computer Science, RWTH Aachen UniversityVerified email at informatik.rwth-aachen.de
Jakob NordströmUniversity of Copenhagen and Lund UniversityVerified email at di.ku.dk
Maria Luisa BonetLSI, UPCVerified email at lsi.upc.edu
Andrei BulatovSimon Fraser UniversityVerified email at sfu.ca
Moritz MüllerVerified email at uni-passau.de
Victor DalmauDepartment of Information and Communication Technologies, Universitat Pompeu FabraVerified email at upf.eduSimone SeveriniVerified email at ucl.ac.uk
Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Elitza ManevaAutonomous University of Barcelona (UAB)Verified email at berkeley.edu
David E. RobersonTechnical University of DenmarkVerified email at dtu.dkLaura MančinskaAssociate Professor at QMATH, University of CopenhagenVerified email at locc.la
Robert Šámalassociate professor, Computer Science Institute, Charles UniversityVerified email at iuuk.mff.cuni.cz
Nicola GalesiSapienza University RomeVerified email at uniroma1.itJohannes K. FichteLinköping UniversityVerified email at liu.se
Moshe Y. VardiRice UniversityVerified email at cs.rice.edu
Ricard GavaldàUniversitat Politècnica de Catalunya + Amalfi AnalyticsVerified email at cs.upc.edu
Susanna F. de RezendeLund UniversityVerified email at cs.lth.se
José Luis BalcázarProfessor, Computer Science, Universitat Politècnica de CatalunyaVerified email at upc.edu