Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
Armin BiereProfessor of Computer Science, University of FreiburgVerified email at informatik.uni-freiburg.de
Klaus HavelundSenior Research Scientist, Jet Propulsion LaboratoryVerified email at jpl.nasa.gov
Lei MaAssociate Professor, The University of Tokyo, Japan & University of Alberta, CanadaVerified email at acm.org
Takashi KitamuraAISTVerified email at aist.go.jp
Kuniyasu SuzakiIISEC: Institute of Information Security, Graduate SchoolVerified email at iisec.ac.jp
Eun-Hye ChoiAISTVerified email at aist.go.jp
Shinichi HonidenNational Institute of Informatics / Waseda UniversityVerified email at nii.ac.jp
Willem VisserComputer Science Division, Stellenbosch UniversityVerified email at cs.sun.ac.za
Corina PasareanuCMU/NASA AmesVerified email at nasa.gov
Rudolf RamlerSoftware Competence Center Hagenberg GmbH (SCCH)Verified email at scch.at
Mojtaba EshghiePhD Student at KTH Royal Institute of TechnologyVerified email at kth.se
Cheng ZhangPost-doctoral research fellow, University of WaterlooVerified email at uwaterloo.ca
Martina SeidlUniv.-Prof., JKU LinzVerified email at jku.at
Grigore RosuUniversity of Illinois at Urbana ChampaignVerified email at illinois.edu
Rich WashingtonGoogleVerified email at google.com
Yoriyuki YamagataSenior Researcher, National Institute of Advanced Industrial Science and Technology (AIST)Verified email at aist.go.jp
Ye LIUResearch Scientist of Singapore Management University; Nanyang Technological University;Verified email at smu.edu.sg
Yi LiNanyang Technological UniversityVerified email at ntu.edu.sg
Koushik SenProfessor of Computer Science, University of California, BerkeleyVerified email at cs.berkeley.edu
Wolfgang AhrendtProfessor of Computer Science, Chalmers University of TechnologyVerified email at chalmers.se