Get my own profile
Public access
View all43 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Orna GrumbergProfessor of Computer Science, TechnionVerified email at cs.technion.ac.il
Andreas HolzerUniversity of TorontoVerified email at cs.toronto.edu
Igor KonnovIndependent Security and Formal Methods ResearcherVerified email at konnov.phd
Christian SchallhartGoogleVerified email at schallhart.net
Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
Johannes KinderProfessor of Computer Science, LMU MunichVerified email at lmu.de
Thomas HenzingerIST AustriaVerified email at ist.ac.at
Michael TautschnigQueen Mary University of LondonVerified email at qmul.ac.uk
Georg GottlobProfessor of Informatics, University of CalabriaVerified email at unical.it
Tomer KotekTU WienVerified email at forsyte.at
Ayrat KhalimovTU ClausthalVerified email at tu-clausthal.de
Nicola LeoneUniversity of Calabria, Professor of Computer ScienceVerified email at unical.it
Mihai ChristodorescuGoogleVerified email at christodorescu.org
Thomas EiterVienna University of Technology (TU Wien)Verified email at kr.tuwien.ac.at
Natasha SharyginaProfessor of Computer Science, Universita della Svizzera Italiana (USI), Lugano, SwitzerlandVerified email at usi.ch
Erich GrädelRWTH Aachen UniversityVerified email at logic.rwth-aachen.de
Alex GroceAssociate Professor of Computer Science, Northern Arizona UniversityVerified email at nau.edu
Armin BiereProfessor of Computer Science, University of FreiburgVerified email at informatik.uni-freiburg.de
Andreas FröhlichJKU LinzVerified email at jku.at
Follow
Helmut Veith
Professor of Computer Science, Vienna University of Technology / TU Wien
Verified email at forsyte.tuwien.ac.at - Homepage