30 Andrea Asperti, \emph{University of Bologna}\\ |
30 Andrea Asperti, \emph{University of Bologna}\\ |
31 Jesper Bengtson, \emph{IT University of Copenhagen}\\ |
31 Jesper Bengtson, \emph{IT University of Copenhagen}\\ |
32 Stefan Berghofer, \emph{Secunet Security Networks AG}\\ |
32 Stefan Berghofer, \emph{Secunet Security Networks AG}\\ |
33 Yves Bertot, \emph{INRIA}\\ |
33 Yves Bertot, \emph{INRIA}\\ |
34 Lars Birkedal, \emph{Aarhus University}\\ |
34 Lars Birkedal, \emph{Aarhus University}\\ |
35 Sandrine Blazy, \emph{IRISA}\\ |
35 Sandrine Blazy, \emph{University of Rennes}\\ |
36 Bob Constable, \emph{Cornell University}\\ |
36 Bob Constable, \emph{Cornell University}\\ |
37 Thierry Coquand, \emph{University of Gothenburg}\\ |
37 Thierry Coquand, \emph{University of Gothenburg}\\ |
38 Xinyu Feng, \emph{Univ.~of Science and Technology of China}\\ |
38 Xinyu Feng, \emph{Univ.~of Science and Technology of China}\\ |
39 Ruben Gamboa, \emph{University of Wyoming}\\ |
39 Ruben Gamboa, \emph{University of Wyoming}\\ |
40 Herman Geuvers, \emph{Radboud University Nijmegen}\\ |
40 Herman Geuvers, \emph{Radboud University Nijmegen}\\ |