Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Hyoungshick KimSungkyunkwan UniversityEmail verificata su skku.edu
- Rakesh B BobbaOregon State UniversityEmail verificata su oregonstate.edu
- Konstantin BeznosovUniversity of British ColumbiaEmail verificata su ece.ubc.ca
- Geumhwan ChoKorea University Sejong CampusEmail verificata su korea.ac.kr
- Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzEmail verificata su ucsc.edu
- Robin BerthierUniversity of IllinoisEmail verificata su illinois.edu
- William H SandersCarnegie Mellon UniversityEmail verificata su cmu.edu
- David Grochocki JrUniversity of Illinois Urbana-Champaign, UIUCEmail verificata su illinois.edu
- Andrew MartinProfessor of Systems Security, University of OxfordEmail verificata su cs.ox.ac.uk
- Jingwei HuangUniversity of Texas Southwestern Medical CenterEmail verificata su utsouthwestern.edu
- Mirko MontanariPhD, Software Engineer at GoogleEmail verificata su illinois.edu
- Roy H CampbellProfessor of Computer Science, University of IllinoisEmail verificata su illinois.edu
- Nina H. FeffermanProfessor of Ecology and Evolutionary Biology & MathematicsEmail verificata su utk.edu
- Ross AndersonUniversity of CambridgeEmail verificata su cl.cam.ac.uk
- John LyleDepartment of Computer Science, University of OxfordEmail verificata su cs.ox.ac.uk
- Apurva MohanSr. Engineering Manager - Digital Security, SchlumbergerEmail verificata su slb.com
- Ulrich HerbergDistinguished Engineer at eBayEmail verificata su herberg.name
- Yoonjoo ChoiAssociate Professor, Medical Research Center, Chonnam National University Medical SchoolEmail verificata su jnu.ac.kr
- Incheol ShinProfessor of Life Science, Hanyang UniversityEmail verificata su hanyang.ac.kr