Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel NeiderTU Dortmund University and Center for Trustworthy Data Science and SecurityVerified email at tu-dortmund.de
Jean-Raphaël GaglionePh.D. StudentVerified email at utexas.edu
Zhe XuAssistant Professor, Arizona State UniversityVerified email at asu.edu
Ufuk TopcuThe University of Texas at AustinVerified email at utexas.edu
Benedikt BolligCNRS, LMF, ENS Paris-Saclay, Université Paris-SaclayVerified email at lsv.ens-cachan.fr
Lina YEUniversité Paris-Saclay, CentraleSupélec, LRIVerified email at centralesupelec.fr
Benoît BarbotLACL, Université Paris-Est CréteilVerified email at lacl.fr
Martin LeuckerProfessor of Computer Science, University of LübeckVerified email at isp.uni-luebeck.de
Serge HaddadProfessor of Computer Science, ENS Paris-SaclayVerified email at lsv.fr
Alain FinkelLMF ENS Paris SaclayVerified email at ens-paris-saclay.fr
Nathanaël FijalkowCNRS, LaBRI, BordeauxVerified email at labri.fr
Ritam RahaPost-doctoral Researcher, Max Planck Institute for Software Systems (MPI-SWS)Verified email at mpi-sws.org
Xuan XieUniversity of AlbertaVerified email at ualberta.ca
Dana FismanAssociate Professor of Computer Science, Ben-Gurion UniversityVerified email at cs.bgu.ac.il
Emmanuel MüllerProfessor of Computer Science, Technical University of DortmundVerified email at cs.tu-dortmund.de
Benedikt BöingTU DortmundVerified email at cs.tu-dortmund.de
Madhavan MukundChennai Mathematical InstituteVerified email at cmi.ac.in
Ahmed BouajjaniProfessor Computer Science, Université Paris CitéVerified email at irif.fr