Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jan VykopalFaculty of Informatics, Masaryk UniversityVerified email at fi.muni.cz
- Pavel ČeledaFaculty of Informatics, Masaryk UniversityVerified email at fi.muni.cz
- Martin UkropMasaryk University, Red HatVerified email at mail.muni.cz
- Daniel TovarnakInstitute of Computer Science, Masaryk UniversityVerified email at mail.muni.cz
- Martin LaštovičkaInstitute of Computer Science, Masaryk UniversityVerified email at ics.muni.cz
- Milan CermakInstitute of Computer Science, Masaryk UniversityVerified email at ics.muni.cz
- Vít RusňákInstitute of Computer Science, Masaryk University, Brno, Czech RepublicVerified email at ics.muni.cz
- Radek OslejsekMasaryk University, Faculty of InformaticsVerified email at fi.muni.cz
- Jens MacheProfessor of Computer Science, Lewis & Clark CollegeVerified email at lclark.edu
- Ankur ChattopadhyayAssistant Professor of Computer Science/Cyber Security, Northern Kentucky UniversityVerified email at nku.edu
- Ryan BakerUniversity of PennsylvaniaVerified email at upenn.edu
- Vashek MatyasMasaryk UniversityVerified email at fi.muni.cz
- Renate MotschnigUniversity of VienneVerified email at univie.ac.at
- Stefan SlaterUniversity of PennsylvaniaVerified email at gse.upenn.edu
- Andrés Felipe ZambranoPhD Student, University of Pennsylvania, Graduate School of EducationVerified email at upenn.edu
- François BouchetLIP6, Sorbonne UniversityVerified email at lip6.fr
- Maciej PankiewiczUniversity of PennsylvaniaVerified email at upenn.edu
- Elizabeth B. CloudeMarie Curie Research Fellow, Tampere UniversityVerified email at tuni.fi
- Jiayi (Joyce) ZhangUniversity of PennsylvaniaVerified email at upenn.edu
- Fouh EricAssistant Professor of Practice, Computer Science. University of PennsylvaniaVerified email at cis.upenn.edu