Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Henri BalVU University AmsterdamEmail verificata su cs.vu.nl
- Thilo KielmannAssociate Professor of Computer Science, Vrije Universiteit, AmsterdamEmail verificata su vu.nl
- Ceriel Jacobsprogrammeur, FEW, Vrije Universiteit AmsterdamEmail verificata su vu.nl
- Koen LangendoenDelft University of TechnologyEmail verificata su tudelft.nl
- Ronald VeldemaPostDoc, University of Erlangen-NurembergEmail verificata su cs.fau.de
- Jason MaassenNetherlands eScience CenterEmail verificata su esciencecenter.nl
- Rob V. van NieuwpoortFull professor at Leiden University, The NetherlandsEmail verificata su liacs.leidenuniv.nl
- Aske PlaatLeiden UniversityEmail verificata su liacs.leidenuniv.nl
- Kees VerstoepICT ConsultantEmail verificata su vu.nl
- Frans KaashoekMassuchesetts Institute of Technology (MIT)Email verificata su mit.edu
- Andrew TanenbaumProfessor of Computer Science, Vrije Universiteit, AmsterdamEmail verificata su cs.vu.nl
- Ismail El HelwComputer Science, Vrije Universiteit AmsterdamEmail verificata su cs.vu.nl
- Paola GrossoFull Professor - University of AmsterdamEmail verificata su uva.nl
- Cees de LaatEm Professor System and Network Engineering, Informatics Institute, University of Amsterdam (NL)Email verificata su uva.nl
- Willem (Wim) G. VreeProfessor of Information and Communication Technology, Delft University of TechnologyEmail verificata su tudelft.nl
- Wan FokkinkProfessor of Computer Science, Vrije Universiteit AmsterdamEmail verificata su vu.nl
- Jun PangUniversity of LuxembourgEmail verificata su uni.lu
- Georgi GaydadjievProfessor in Computer Architecture, University of GroningenEmail verificata su rug.nl
- Frances BrazierFull professor Systems Engineering, Delft University of TechnologyEmail verificata su tudelft.nl
- Pieter HartelProfessor Emeritus Cyber securityEmail verificata su tudelft.nl
Segui