Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Daniel NeiderTU Dortmund University and Center for Trustworthy Data Science and SecurityVerified email at tu-dortmund.de
- Jean-Raphaël GaglionePh.D. StudentVerified email at utexas.edu
- Zhe XuAssistant Professor, Arizona State UniversityVerified email at asu.edu
- Ufuk TopcuThe University of Texas at AustinVerified email at utexas.edu
- Benedikt BolligCNRS, LMF, ENS Paris-Saclay, Université Paris-SaclayVerified email at lsv.ens-cachan.fr
- Lina YEUniversité Paris-Saclay, CentraleSupélec, LRIVerified email at centralesupelec.fr
- Benoît BarbotLACL, Université Paris-Est CréteilVerified email at lacl.fr
- Martin LeuckerProfessor of Computer Science, University of LübeckVerified email at isp.uni-luebeck.de
- Serge HaddadProfessor of Computer Science, ENS Paris-SaclayVerified email at lsv.fr
- Alain FinkelLMF ENS Paris SaclayVerified email at ens-paris-saclay.fr
- Nathanaël FijalkowCNRS, LaBRI, Bordeaux, and University of WarsawVerified email at labri.fr
- Ritam RahaPost-doctoral Researcher, Max Planck Institute for Software Systems (MPI-SWS)Verified email at mpi-sws.org
- Xuan XieUniversity of AlbertaVerified email at ualberta.ca
- Dana FismanAssociate Professor of Computer Science, Ben-Gurion UniversityVerified email at cs.bgu.ac.il
- Emmanuel MüllerProfessor of Computer Science, Technical University of DortmundVerified email at cs.tu-dortmund.de
- Benedikt BöingTU DortmundVerified email at cs.tu-dortmund.de
- Madhavan MukundChennai Mathematical InstituteVerified email at cmi.ac.in
- Ahmed BouajjaniProfessor Computer Science, Université Paris CitéVerified email at irif.fr