Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Malcolm HeywoodProfessor, Computer Science, Dalhousie UniversityEmail verificata su cs.dal.ca
- Atif KhanComputer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Hadi HosseiniPenn State UniversityEmail verificata su psu.edu
- Kate LarsonUniversity of WaterlooEmail verificata su uwaterloo.ca
- Daniel LizotteAssociate Professor of Computer Science; Associate Professor of Epidemiology and BiostatisticsEmail verificata su uwo.ca
- Alan TsangCarleton UniversityEmail verificata su carleton.ca
- Catherine HollowayGraduate Student, Institute for Quantum ComputingEmail verificata su iqc.ca
- Christopher ErvenCEO, KETS Quantum Security Ltd;Email verificata su kets-quantum.com
- Cecylia BocovichThe Tor ProjectEmail verificata su uwaterloo.ca
- Steven J. MurdochDepartment of Computer Science, University College LondonEmail verificata su ucl.ac.uk
- Tariq ElahiAssistant Professor, School of Informatics - University of EdinburghEmail verificata su ed.ac.uk
- Hooman Mohajeri MoghaddamPrinceton University, International Computer Science Institute (ICSI),Email verificata su princeton.edu
- John ChampaignMassachusetts Institute of TechnologyEmail verificata su mit.edu
- Darren AbramsonAssociate Professor of Philosophy, Dalhousie UniversityEmail verificata su dal.ca
- Sawyer WeldenEmail verificata su wakehealth.edu
- Eric BrighamEmail verificata su ncf.edu