Get my own profile
Public access
View all18 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Harald SøndergaardComputing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
- Peter StuckeyFaculty of Information Technology, Monash UniversityVerified email at monash.edu
- Graeme GangeMonash UniversityVerified email at monash.edu
- Jorge A NavasCertoraVerified email at certora.com
- Fergus HendersonGoogleVerified email at google.com
- Kim MarriottProfessor, Monash UniversityVerified email at monash.edu
- Roberto AmadiniUniversity of BolognaVerified email at unibo.it
- Thomas ConwayMurdoch Children Research InstituteVerified email at mcri.edu.au
- Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
- Bishoksan KafleResearch Fellow, The University of Melbourne, AustraliaVerified email at unimelb.edu.au
- R JefferyUNSWVerified email at cse.unsw.edu.au
- Alexander JordanOracle LabsVerified email at oracle.com
- François GauthierSenior Principal Researcher, Oracle LabsVerified email at oracle.com
- Roberto BagnaraDepartment of Mathematical, Physical and Computer Sciences - University of Parma, ItalyVerified email at cs.unipr.it
- Nataliia (Pobiedina) RümmeleSiemens AGVerified email at siemens.com
- Paul BoneNo affiliationVerified email at bone.id.au
- John P GallagherRoskilde UniversityVerified email at ruc.dk
- Georges SaabOracle CorporationVerified email at oracle.com
- Peter RossNapier UniversityVerified email at napier.ac.uk
- Andrew BromageKeyframe.AIVerified email at keyframe.ai
Follow
Peter Schachte
School of Computing and Information Systems, University of Melbourne
Verified email at unimelb.edu.au - Homepage