Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Geeth de MelResearch Staff MemberEmail verificata su uk.ibm.com
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteEmail verificata su cardiff.ac.uk
- Dinesh VermaIBMEmail verificata su us.ibm.com
- Thomas La PortaPenn State UniversityEmail verificata su cse.psu.edu
- Greg CirincioneARLEmail verificata su mail.mil
- Federico CeruttiUniversity of BresciaEmail verificata su unibs.it
- Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKEmail verificata su abdn.ac.uk
- Mario Gómez MartínezAssociate Professor (UPV)Email verificata su dsic.upv.es
- Dave BrainesIBM Research, UKEmail verificata su uk.ibm.com
- Amotz Bar-NoyProfessor of Computer Science, City University of New York (CUNY)Email verificata su sci.brooklyn.cuny.edu
- Hosam RowaihyAssistant Professor of Computer Engineering, King Fahd University of Petroleum and MineralsEmail verificata su kfupm.edu.sa
- Diego PizzocaroHonorary Research Fellow, Cardiff University, UKEmail verificata su cs.cardiff.ac.uk
- Matthew P. JohnsonDepartment of CS, Lehman College, CUNYEmail verificata su ucla.edu
- Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAEmail verificata su ucla.edu
- Lance KaplanArmy Research LaboratoryEmail verificata su mail.mil
- Christopher GibsonIBM Research, IBM UKEmail verificata su uk.ibm.com
- Diane FelmleeProfessor of Sociology, Pennsylvania UniversityEmail verificata su psu.edu
- Derek SleemanProfessor of Computing Science, The University, Aberdeen, UKEmail verificata su abdn.ac.uk
- Alice TonioloUniversity of St AndrewsEmail verificata su st-andrews.ac.uk
- Nir OrenProfessor at the University of AberdeenEmail verificata su abdn.ac.uk