31 Jesper Bengtson, \emph{IT University of Copenhagen}\\ |
31 Jesper Bengtson, \emph{IT University of Copenhagen}\\ |
32 Stefan Berghofer, \emph{Secunet Security Networks AG}\\ |
32 Stefan Berghofer, \emph{Secunet Security Networks AG}\\ |
33 Yves Bertot, \emph{INRIA}\\ |
33 Yves Bertot, \emph{INRIA}\\ |
34 Lars Birkedal, \emph{Aarhus University}\\ |
34 Lars Birkedal, \emph{Aarhus University}\\ |
35 Sandrine Blazy, \emph{IRISA}\\ |
35 Sandrine Blazy, \emph{IRISA}\\ |
|
36 Bob Constable, \emph{Cornell University}\\ |
36 Thierry Coquand, \emph{University of Gothenburg}\\ |
37 Thierry Coquand, \emph{University of Gothenburg}\\ |
37 Xinyu Feng, \emph{Univ.~of Science and Technology of China}\\ |
38 Xinyu Feng, \emph{Univ.~of Science and Technology of China}\\ |
38 Ruben Gamboa, \emph{University of Wyoming}\\ |
39 Ruben Gamboa, \emph{University of Wyoming}\\ |
39 Herman Geuvers, \emph{Radboud University Nijmegen}\\ |
40 Herman Geuvers, \emph{Radboud University Nijmegen}\\ |
40 Mike Gordon, \emph{Cambridge University}\\ |
41 Mike Gordon, \emph{Cambridge University}\\ |