Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mazeiar SalehieResearch Fellow, Lero (Irish Software Engineering Research Centre)Verified email at lero.ie
Kostas KontogiannisProfessor, York University, Department of Electrical Engineering and Computer ScienceVerified email at uwo.ca
Siavash MirarabUniversity of California at San DiegoVerified email at ucsd.edu
Mehdi AmouiUniversity of WaterlooVerified email at uwaterloo.ca
Mohammad HamdaqaAssistant Professor, Polytechnique MontrealVerified email at polymtl.ca
Sepehr EghbaliApplied Scientist at AmazonVerified email at amazon.com
Hausi A. MüllerDepartment of Computer Science, Faculty of Engineering, University of Victoria, IEEE Quantum WeekVerified email at cs.uvic.ca
Nilam Kaushikstudent at UCLVerified email at ucl.ac.uk
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Norha M. VillegasFaculty and Researcher, Department of Computing and Intelligent Systems, Universidad IcesiVerified email at icesi.edu.co
Gabriel TamuraProfessor, Dept. of Information and Communication Tecnologies, Icesi UniversityVerified email at icesi.edu.co
Mahsa Emami-TabaPhD, University of WaterlooVerified email at uwaterloo.ca
Mauro PezzèProfessor of Software Engineering, USI (Switzerland) and Milano Bicocca (Italy)Verified email at usi.ch
Wilhelm SchaeferProfessor für Informatik Universität PaderbornVerified email at upb.de
Gabor KarsaiVanderbilt UniversityVerified email at vanderbilt.edu
Kenny WongAssociate Professor, Computing Science, University of AlbertaVerified email at cs.ualberta.ca
Ali Reza SharafatstanfordVerified email at stanford.edu
Azin AshkanGoogleVerified email at uwaterloo.ca
Rozita DaraAssociate Professor, University of GuelphVerified email at uoguelph.ca
Afshar GanjaliApplication Security Researcher, Security CompassVerified email at utoronto.ca