Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jan VykopalFaculty of Informatics, Masaryk UniversityVerified email at fi.muni.cz
Pavel ČeledaFaculty of Informatics, Masaryk UniversityVerified email at fi.muni.cz
Martin UkropMasaryk University, Red HatVerified email at mail.muni.cz
Daniel TovarnakInstitute of Computer Science, Masaryk UniversityVerified email at mail.muni.cz
Vít RusňákInstitute of Computer Science, Masaryk University, Brno, Czech RepublicVerified email at ics.muni.cz
Martin LaštovičkaInstitute of Computer Science, Masaryk UniversityVerified email at ics.muni.cz
Milan CermakInstitute of Computer Science, Masaryk UniversityVerified email at ics.muni.cz
Ryan BakerUniversity of PennsylvaniaVerified email at upenn.edu
Jens MacheProfessor of Computer Science, Lewis & Clark CollegeVerified email at lclark.edu
Ankur ChattopadhyayAssistant Professor of Computer Science/Cyber Security, Northern Kentucky UniversityVerified email at nku.edu
Vashek MatyasMasaryk UniversityVerified email at fi.muni.cz
Atsushi ShimadaProfessor of Kyushu UniversityVerified email at ait.kyushu-u.ac.jp
Renate MotschnigUniversity of VienneVerified email at univie.ac.at
Andrés Felipe ZambranoPhD Student, University of Pennsylvania, Graduate School of EducationVerified email at upenn.edu
Maria Mercedes T. RodrigoProfessor, Ateneo de Manila UniversityVerified email at ateneo.edu
Sébastien LalléLIP6, Sorbonne UniversityVerified email at lip6.fr
Mélina VergerPhD student, Sorbonne Université, CNRS, LIP6Verified email at lip6.fr
Maciej PankiewiczUniversity of PennsylvaniaVerified email at upenn.edu
Elizabeth B. CloudeMarie Curie Research Fellow, Tampere UniversityVerified email at tuni.fi
Jiayi (Joyce) ZhangUniversity of PennsylvaniaVerified email at upenn.edu