Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jan VykopalFaculty of Informatics, Masaryk UniversityVerified email at fi.muni.cz
Pavel ČeledaFaculty of Informatics, Masaryk UniversityVerified email at fi.muni.cz
Martin UkropMasaryk University, Red HatVerified email at mail.muni.cz
Daniel TovarnakInstitute of Computer Science, Masaryk UniversityVerified email at mail.muni.cz
Ryan BakerUniversity of PennsylvaniaVerified email at upenn.edu
Atsushi ShimadaProfessor of Kyushu UniversityVerified email at ait.kyushu-u.ac.jp
Jens MacheProfessor of Computer Science, Lewis & Clark CollegeVerified email at lclark.edu
Ankur ChattopadhyayAssistant Professor of Computer Science/Cyber Security, Northern Kentucky UniversityVerified email at nku.edu
Vashek MatyasMasaryk UniversityVerified email at fi.muni.cz
Renate MotschnigUniversity of VienneVerified email at univie.ac.at
Andrés Felipe ZambranoPhD Student, University of Pennsylvania, Graduate School of EducationVerified email at upenn.edu
Maria Mercedes T. RodrigoProfessor, Ateneo de Manila UniversityVerified email at ateneo.edu
Sébastien LalléLIP6, Sorbonne UniversityVerified email at lip6.fr
Mélina VergerPhD in Computer Science, Sorbonne Université, CNRS, LIP6Verified email at lip6.fr
Elizabeth B. CloudeAssistant Professor, Michigan State UniversityVerified email at msu.edu
Li ChenFaculty of Information Science and Electrical Engineering, Kyushu UniversityVerified email at mark-lab.net
Conrad BorchersCarnegie Mellon UniversityVerified email at cs.cmu.edu
François BouchetLIP6, Sorbonne UniversityVerified email at lip6.fr
Maciej PankiewiczUniversity of PennsylvaniaVerified email at upenn.edu
Sukrit LeelalukKyushu UniversityVerified email at s.kyushu-u.ac.jp