Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jan VykopalFaculty of Informatics, Masaryk UniversityVerified email at fi.muni.cz
- Pavel ČeledaFaculty of Informatics, Masaryk UniversityVerified email at fi.muni.cz
- Martin UkropMasaryk University, Red HatVerified email at mail.muni.cz
- Daniel TovarnakInstitute of Computer Science, Masaryk UniversityVerified email at mail.muni.cz
- Vít RusňákInstitute of Computer Science, Masaryk University, Brno, Czech RepublicVerified email at ics.muni.cz
- Ryan BakerUniversity of PennsylvaniaVerified email at upenn.edu
- Jens MacheProfessor of Computer Science, Lewis & Clark CollegeVerified email at lclark.edu
- Ankur ChattopadhyayAssistant Professor of Computer Science/Cyber Security, Northern Kentucky UniversityVerified email at nku.edu
- Atsushi ShimadaProfessor of Kyushu UniversityVerified email at ait.kyushu-u.ac.jp
- Vashek MatyasMasaryk UniversityVerified email at fi.muni.cz
- Renate MotschnigUniversity of VienneVerified email at univie.ac.at
- Andrés Felipe ZambranoPhD Student, University of Pennsylvania, Graduate School of EducationVerified email at upenn.edu
- Maria Mercedes T. RodrigoProfessor, Ateneo de Manila UniversityVerified email at ateneo.edu
- Sébastien LalléLIP6, Sorbonne UniversityVerified email at lip6.fr
- Mélina VergerPhD student, Sorbonne Université, CNRS, LIP6Verified email at lip6.fr
- Elizabeth B. CloudeAssistant Professor, Michigan State UniversityVerified email at msu.edu
- Conrad BorchersCarnegie Mellon UniversityVerified email at cs.cmu.edu
- François BouchetLIP6, Sorbonne UniversityVerified email at lip6.fr
- Maciej PankiewiczUniversity of PennsylvaniaVerified email at upenn.edu
- Sukrit LeelalukKyushu UniversityVerified email at s.kyushu-u.ac.jp