Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Gerhard W DueckProfessor of Computer Science, University of New BrunswickEmail verificata su unb.ca
- Jon MuzioProfessor of Computer Science, University of VictoriaEmail verificata su cs.uvic.ca
- Mitchell A ThorntonSouthern Methodist University, Darwin Deason Institute for Cyber SecurityEmail verificata su ieee.org
- Rolf DrechslerProfessor at University of Bremen, Director DFKI Bremen, GermanyEmail verificata su uni-bremen.de
- Dmitri MaslovIBM Thomas J. Watson Research CenterEmail verificata su ibm.com
- Robert WilleTechnical University of Munich and SCCH GmbHEmail verificata su tum.de
- Mathias SoekenMicrosoftEmail verificata su epfl.ch
- Elena DubrovaRoyal Institute of Technology (KTH), Stockholm, SwedenEmail verificata su kth.se
- Robert D McLeodUniversity of ManitobaEmail verificata su umanitoba.ca
- Micaela SerraProfessor of Computer Science, University of VictoriaEmail verificata su uvic.ca
- Svetlana YanushkevichProfessor, University of CalgaryEmail verificata su ucalgary.ca
- Shigeru YamashitaRitsumeikan UniversityEmail verificata su cs.ritsumei.ac.jp
- Shin-ichi MinatoKyoto UniversityEmail verificata su i.kyoto-u.ac.jp
- Daniel GrosseFull Professor at Johannes Kepler University LinzEmail verificata su jku.at
- martin lukacHiroshima City UniversityEmail verificata su s.hiroshima-cu.ac.jp
Segui
David Michael Miller
Professor Emeritus of Computer Science, University of Victoria
Email verificata su uvic.ca