Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Dinei FlorencioMicrosoft ResearchEmail verificata su microsoft.com
- martin vetterliProfessor of computer and communication science, Ecole Polytechnique Federale LausanneEmail verificata su epfl.ch
- Paul C. van OorschotProfessor of Computer Science, Carleton University, CanadaEmail verificata su scs.carleton.ca
- Kannan RamchandranProfessor of Electrical Engineering and Computer Science, UC BerkeleyEmail verificata su eecs.berkeley.edu
- Venkata N. PadmanabhanMicrosoft Research IndiaEmail verificata su microsoft.com
- Frank StajanoProfessor of Security and Privacy, University of Cambridge Computer LabEmail verificata su cl.cam.ac.uk
- Joseph BonneauNew York UniversityEmail verificata su cs.nyu.edu
- John C. PlattGoogleEmail verificata su google.com
- Jelena KovacevicDean, NYU Tandon School of EngineeringEmail verificata su nyu.edu
- Zixiang XiongProf. Texas A&M UniversityEmail verificata su ece.tamu.edu
- Serge EgelmanUniversity of California, Berkeley / International Computer Science Institute (ICSI) / AppCensusEmail verificata su cs.berkeley.edu
- Poorvi L. VoraDepartment of Computer Science, The George Washingtion UniversityEmail verificata su email.gwu.edu
- Konstantin BeznosovUniversity of British ColumbiaEmail verificata su ece.ubc.ca
- Baris CoskunAmazon Web ServicesEmail verificata su skun.co
- Michael MitzenmacherProfessor of Computer Science, Harvard UniversityEmail verificata su eecs.harvard.edu
- Gang WangAssociate Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Ildar MuslukhovThe University of British ColumbiaEmail verificata su ece.ubc.ca
- Paul ViolaMicrosoftEmail verificata su microsoft.com
- Doron ShakedGE-HealthcareEmail verificata su gehealthcare.com
- Wolter PietersProfessor of Work, Organisations and Digital Technology, Radboud University NijmegenEmail verificata su ru.nl