Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sunghun KimAssociate Professor of Computer Science, The Hong Kong University of Science and TechnologyEmail verificata su cse.ust.hk
- Song WangAssistant Professor at York University, CanadaEmail verificata su eecs.yorku.ca
- Lin TanMary J. Elmore New Frontiers Professor, Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Dongsun KimKyungpook National UniversityEmail verificata su knu.ac.kr
- Jaewoo SongDepartment of Computer Science and Engineering, The Hong Kong University of Science and TechnologyEmail verificata su connect.ust.hk
- Sinno Jialin PanThe Chinese University of Hong KongEmail verificata su cuhk.edu.hk
- Hoh Peter InProfessor of Computer Science, Korea UniversityEmail verificata su korea.ac.kr
- Taek LeeSun Moon UniversityEmail verificata su sunmoon.ac.kr
- DongGyun HanRoyal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Jiho ShinPh.D. student, York UniversityEmail verificata su yorku.ca
- Junjie WangInstitute of Software, Chinese Academy of SciencesEmail verificata su iscas.ac.cn
- Mijung KimUNIST, South KoreaEmail verificata su unist.ac.kr
- Martin SchaefAmazon Web ServicesEmail verificata su amazon.com
- Pantelis M. Papadopoulos, Ph.DAssociate Professor, Department of Instructional Technology, University of TwenteEmail verificata su utwente.nl
- Andreas PodelskiProfessor of Computer Science, Freiburg UniversityEmail verificata su informatik.uni-freiburg.de
- Nachiappan NagappanFacebookEmail verificata su fb.com
- Daniel DietschUniversity FreiburgEmail verificata su informatik.uni-freiburg.de
- Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityEmail verificata su cispa.de
- Tim MenziesNorth Carolina State University, Computer Science, IEEE Fellow, ASE FellowEmail verificata su ncsu.edu