Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yijia ChenShanghai Jiao Tong UniversityEmail verificata su cs.sjtu.edu.cn
- Yican SunPh.D. Student, Peking UniversityEmail verificata su pku.edu.cn
- Édouard BonnetENS Lyon, LIP, FranceEmail verificata su ens-lyon.fr
- Dániel MarxCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Ken-ichi KawarabayashiNational Institute of Informatics, The University of TokyoEmail verificata su nii.ac.jp
- Pasin ManurangsiGoogle ResearchEmail verificata su google.com
- Arnab BhattacharyyaAssociate Professor, National University of SingaporeEmail verificata su nus.edu.sg
- Suprovat GhoshalPostdoc at Northwestern University and TTI ChicagoEmail verificata su northwestern.edu
- Chihao ZhangShanghai Jiao Tong UniversityEmail verificata su sjtu.edu.cn
- Martin GroheProfessor of Computer Science, RWTH Aachen UniversityEmail verificata su informatik.rwth-aachen.de
- Venkatesan GuruswamiUniversity of California, BerkeleyEmail verificata su berkeley.edu
- Kewen WuUC BerkeleyEmail verificata su berkeley.edu
- Yoichi IwataNational Institute of InformaticsEmail verificata su nii.ac.jp
- Hiroshi ImaiDepartment of Computer Science, University of TokyoEmail verificata su is.s.u-tokyo.ac.jp
- Karthik C. S.Rutgers UniversityEmail verificata su rutgers.edu