Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Harald SøndergaardComputing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Neil JonesVerified email at diku.dk
Lars BirkedalDept. of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Stephan DiehlProfessor of Computer Science, University of TrierVerified email at uni-trier.de
Martin ElsmanProfessor, DIKUVerified email at di.ku.dk
Sergei A. RomanenkoResearcher, Keldysh Institute of Applied MathematicsVerified email at supercompilers.ru
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Andrzej WąsowskiProfessor, IT University of Copenhagen, DenmarkVerified email at itu.dk
Thomas BøgholmAalborg UniversitetVerified email at cs.aau.dk
Lone Leth ThomsenAssociate Professor, Department of Computer Science, Aalborg UniversityVerified email at acm.org
Bent ThomsenProfessor (MSO), Aalborg UniversityVerified email at acm.org
Anne Louise GimsingDanish Ministry of EnvironmentVerified email at mim.dk
David Thrane ChristiansenDeon DigitalVerified email at deondigital.com
Sebastien Vaucouleurvaucouleur.comVerified email at vaucouleur.com
Ebbe Sloth AndersenAssociate Professor, Aarhus UniversityVerified email at inano.au.dk
Jakob Hull HavgaardUniversity of CopenhagenVerified email at rth.dk
Claudio RussoMicrosoft Research LtdVerified email at microsoft.com
Filip SieczkowskiHeriot-Watt UniversityVerified email at hw.ac.uk
Wensheng DouProfessor, Institute of Software Chinese Academy of Sciences (ISCAS)Verified email at iscas.ac.cn
Ken Friis LarsenAssociate professor, Department of Computer Science, University of CopenhagenVerified email at diku.dk