Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
Fabiano DalpiazUtrecht UniversityVerified email at uu.nl
Jennifer HorkoffUniversity of Gothenburg/Chalmers University of TechnologyVerified email at chalmers.se
Tong Li (李童)Associate Professor, Beijing University of TechnologyVerified email at bjut.edu.cn
Elda PajaAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Mattia SalnitriPostdoctoral Research Fellow at Politecnico di MilanoVerified email at polimi.it
Evellin CardosoFederal University of Goias, BrazilVerified email at ufg.br
Alejandro MateAssociate Professor at University of Alicante (UA)Verified email at dlsi.ua.es
Sjaak BrinkkemperProfessor of Software Production, Utrecht UniversityVerified email at uu.nl
Luca PirasLecturer of Software Engineering, Privacy Engineering and Cyber Security at Robert Gordon UniversityVerified email at rgu.ac.uk
Munindar P SinghProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Amit K ChopraSenior lecturer, Lancaster UniversityVerified email at lancaster.ac.uk
Tuğçe GüneşBoğaziçi UniversityVerified email at boun.edu.tr
Pınar YolumUtrecht UniversityVerified email at uu.nl
Davide Dell'AnnaPostdoctoral Researcher, Delft University of TechnologyVerified email at tudelft.nl
Ilker BirbilUniversity of AmsterdamVerified email at uva.nl
Muhammad Tahir KhanSaal.aiVerified email at saal.ai
Gregorio ConvertinoGoogleVerified email at google.com
Ligia BatrincaUniversity of TrentoVerified email at unitn.it
Follow