Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mohamed ShehabProfessor, University of North Carolina at CharlotteEmail verificata su uncc.edu
- Halil BisginUniversity of Michigan-FlintEmail verificata su umich.edu
- Usman RaufHead of CRiSP Lab., Mercy UniversityEmail verificata su mercy.edu
- Zhiyuan weiSoftware Engineer, Rocky Mountain RobotechEmail verificata su mercy.edu
- Hamed AbdelhaqAn-Najah National UniversityEmail verificata su najah.edu
- Dimka KarastoyanovaUniversity of GroningenEmail verificata su rug.nl
- Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteEmail verificata su uncc.edu
- Ehab Al-ShaerCarnegie Mellon UniversityEmail verificata su cmu.edu
- Yongge WangUNC CharlotteEmail verificata su uncc.edu
- Qi DuanCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Adel ShtayyehDepartment of Networks & Information Security, An-Najah National University, Nablus, PalestineEmail verificata su stu.najah.edu
- Mohammad Ashiqur RahmanFlorida International UniversityEmail verificata su fiu.edu
- George AzzopardiAssociate Professor, Computer Science, Bernoulli Institute, University of GroningenEmail verificata su rug.nl
- J. Haadi JafarianAssistant Professor at Department of Computer Science and Engineering, University of Colorado DenverEmail verificata su ucdenver.edu
- Fatih TurkmenUniversity of GroningenEmail verificata su rug.nl