Get my own profile
Public access
View all58 articles
1 article
available
not available
Based on funding mandates
Co-authors
John DerrickUniversity of SheffieldVerified email at sheffield.ac.uk
Heike WehrheimUniversity of OldenburgVerified email at uni-oldenburg.de
Ian James HayesProfessor of Software Engineering, The University of QueenslandVerified email at uq.edu.au
Simon DohertyUniversity of SheffieldVerified email at sheffield.ac.uk
Sadegh DalvandiPrincipal Formal Verification Engineer at AxiomiseVerified email at dalvandi.com
Graeme SmithThe University of QueenslandVerified email at itee.uq.edu.au
Georg StruthUniversity of SheffieldVerified email at sheffield.ac.uk
Ori LahavTel Aviv UniversityVerified email at tau.ac.il
Azalea RaadImperial College LondonVerified email at imperial.ac.uk
Oleg TravkinPhD Student, Universität PaderbornVerified email at zitmail.uni-paderborn.de
John WickersonImperial College LondonVerified email at imperial.ac.uk
Jim WoodcockProfessor of Software Engineering, University of YorkVerified email at york.ac.uk
Matt GriffinPhD ResearcherVerified email at surrey.ac.uk
Victor GomesResearch Associate, University of CambridgeVerified email at cl.cam.ac.uk
Radha JagadeesanProfessor. School of Computing.Verified email at depaul.edu
James RielyProfessor of Computing, DePaul UniversityVerified email at cs.depaul.edu
Tsz Yiu LamBrunel University LondonVerified email at alumni.brunel.ac.uk
Peter Gorm LarsenAarhus UniversityVerified email at ece.au.dk
Tomas KulikSecurity and Formal Methods evangelist, Sweet GeeksVerified email at sweetgeeks.dk
Hugo Daniel MacedoAarhus UniversityVerified email at ece.au.dk