Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mark D. RyanProfessor of Computer Security, University of BirminghamEmail verificata su cs.bham.ac.uk
- Eike RitterSenior Lecturer in Computer Science, University of Birmingham, UKEmail verificata su cs.bham.ac.uk
- Loretta Ilaria ManciniUniversity of BirminghamEmail verificata su cs.bham.ac.uk
- Steve KremerInriaEmail verificata su inria.fr
- Tom ChothiaUniversity of BirminghamEmail verificata su cs.bham.ac.uk
- Sergiu Bursucpostdoctoral researcher, University of LuxembourgEmail verificata su uni.lu
- Vincent ChevalUniversity of Oxford, United KingdomEmail verificata su cs.ox.ac.uk
- Véronique CortierCNRS, LORIAEmail verificata su loria.fr
- Marie DuflotLORIA - Université de Lorraine & INRIAEmail verificata su inria.fr
- Michael FisherProfessor of Computer Science, University of ManchesterEmail verificata su manchester.ac.uk
- Philip D. GraySchool of Computing Science, University of GlasgowEmail verificata su glasgow.ac.uk
- Sven ScheweProfessor of Computer Science, University of LiverpoolEmail verificata su liverpool.ac.uk
- Alice MillerProfessor, University of GlasgowEmail verificata su glasgow.ac.uk
- Rehana YasminResearch Scientist, King Abdullah University of Science & Technology (KAUST)Email verificata su kaust.edu.sa
- Muffy CalderProfessor of Computing Science, University of GlasgowEmail verificata su glasgow.ac.uk
- Jia LiuResearcher at Enya LabsEmail verificata su enya.ai
- Frédéric GavaLACL, University of Paris-EastEmail verificata su univ-paris-est.fr
- Frédéric LoulergueUniversité d'Orléans, FranceEmail verificata su univ-orleans.fr
- Louise DennisDepartment of Computer Science, University of ManchesterEmail verificata su manchester.ac.uk
- Ben SmythFounder-CEO, x26.ioEmail verificata su bensmyth.com