Get my own profile
Public access
View all18 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Harald SøndergaardComputing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Peter StuckeyFaculty of Information Technology, Monash UniversityVerified email at monash.edu
Graeme GangeMonash UniversityVerified email at monash.edu
Jorge A NavasCertoraVerified email at certora.com
Fergus HendersonGoogleVerified email at google.com
Kim MarriottProfessor, Monash UniversityVerified email at monash.edu
Roberto AmadiniUniversity of BolognaVerified email at unibo.it
Thomas ConwayMurdoch Children Research InstituteVerified email at mcri.edu.au
Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
Bishoksan KafleResearch Fellow, The University of Melbourne, AustraliaVerified email at unimelb.edu.au
R JefferyUNSWVerified email at cse.unsw.edu.au
Alexander JordanOracle LabsVerified email at oracle.com
François GauthierSenior Principal Researcher, Oracle LabsVerified email at oracle.com
Roberto BagnaraDepartment of Mathematical, Physical and Computer Sciences - University of Parma, ItalyVerified email at cs.unipr.it
Nataliia (Pobiedina) RümmeleSiemens AGVerified email at siemens.com
Paul BoneNo affiliationVerified email at bone.id.au
John P GallagherRoskilde UniversityVerified email at ruc.dk
Georges SaabOracle CorporationVerified email at oracle.com
Peter RossNapier UniversityVerified email at napier.ac.uk
Andrew BromageKeyframe.AIVerified email at keyframe.ai
Follow
Peter Schachte
School of Computing and Information Systems, University of Melbourne
Verified email at unimelb.edu.au - Homepage