Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sophie TisonUniversity of LilleVerified email at univ-lille.fr
- Hubert Comon-LundhComputer Science professor, ENS CachanVerified email at lsv.ens-cachan.fr
- Michael RusinowitchINRIAVerified email at loria.fr
- Marc TommasiProfessor of Computer Science, Lille UniversityVerified email at univ-lille.fr
- Adel BouhoulaProfessor of Computer Science, Formal Methods and Cybersecurity. Arabian Gulf UniversityVerified email at agu.edu.bh
- Rémi GilleronProfessor emeritus of Computer Science, Lille UniversityVerified email at univ-lille.fr
- Francesco FoscarinPostdoctoral researcher, Johannes Kepler University LinzVerified email at jku.at
- Masahiko SakaiNagoya UniversityVerified email at i.nagoya-u.ac.jp
- Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
- Jean BressonAbletonVerified email at ircam.fr
- Jean-Louis GiavittoResearch director in Computer Science, CNRS & IRCAMVerified email at ircam.fr
- Arshia ContAntescofo SASVerified email at antescofo.com
- Pierre Donat-BouilludCzech Technical UniversityVerified email at fit.cvut.cz
- Margus VeanesMicrosoft ResearchVerified email at microsoft.com
- Clément PonceletMTB 111Verified email at it.uu.se
- Adrien YcartSoundHoundVerified email at soundhound.com
- Luis Barguñó JanéGoogleVerified email at google.com
- Nicolas Perrin-GilbertISIR - CNRS UMR7222Verified email at isir.upmc.fr
- Andrew McLeodFraunhofer IDMTVerified email at idmt.fraunhofer.de
- Christoph WeidenbachProfessor of Computer Science, Max Planck Institute for Informatics, Saarland Informatics CampusVerified email at mpi-inf.mpg.de