Crea il mio profilo
Accesso pubblico
Visualizza tutto40 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Viktor VafeiadisMax Planck Institute for Software Systems (MPI-SWS), Saarland Informatics Campus (SIC)Email verificata su mpi-sws.org
Azalea RaadImperial College LondonEmail verificata su imperial.ac.uk
Anton PodkopaevJetBrains Research, Constructor University BremenEmail verificata su jetbrains.com
Chung-Kil HurSeoul National UniversityEmail verificata su sf.snu.ac.kr
Derek DreyerMax Planck Institute for Software Systems (MPI-SWS), Saarland Informatics CampusEmail verificata su mpi-sws.org
Arnon AvronProfessor of Computer Science, Tel Aviv universityEmail verificata su cs.tau.ac.il
Yoni ZoharBar Ilan UniversityEmail verificata su biu.ac.il
Jeehoon KangKAIST School of ComputingEmail verificata su kaist.ac.kr
Mooly SagivTel Aviv UniversityEmail verificata su acm.org
Brijesh DongolUniversity of SurreyEmail verificata su surrey.ac.uk
Anna ZamanskyAssociate Professor, Information Systems Dept. University of HaifaEmail verificata su is.haifa.ac.il
Sung-Hwan LeeRebellions Inc.Email verificata su rebellions.ai
Minki ChoCompiler Engineer, FuriosaAIEmail verificata su furiosa.ai
John WickersonImperial College LondonEmail verificata su imperial.ac.uk
Michalis KokologiannakisETH ZurichEmail verificata su inf.ethz.ch
Aurojit PandaNYUEmail verificata su cs.nyu.edu
Katerina ArgyrakiAssociate Professor at the School of Computer and Communication Sciences, EPFL, SwitzerlandEmail verificata su epfl.ch
Scott ShenkerProfessor of Computer Science, UC BerkeleyEmail verificata su icsi.berkeley.edu
Hai DangBlueRock Security IncEmail verificata su mpi-sws.org
Artem KhyzhaArmEmail verificata su arm.com