Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Harald SøndergaardComputing and Information Systems, The University of MelbourneEmail verificata su unimelb.edu.au
- Bernard PopeThe University of MelbourneEmail verificata su unimelb.edu.au
- Vanessa TeagueThinking Cybersecurity and The Australian National UniversityEmail verificata su anu.edu.au
- Justin ZobelComputing and Information Systems, University of MelbourneEmail verificata su unimelb.edu.au
- Philip DartSchool of Computing and Information Systems, The University of MelbourneEmail verificata su unimelb.edu.au
- Kim MarriottProfessor, Monash UniversityEmail verificata su monash.edu
- NeelofarMonash University, Melbourne, AustraliaEmail verificata su monash.edu
- Leon SterlingUniversity of Melbourne & Swinburne University of TechnologyEmail verificata su swin.edu.au
- Tal MoranIDC HerzliyaEmail verificata su idc.ac.il
- Doug PalmerCSIROEmail verificata su csiro.au
- John ShepherdComputer Science and Engineering (CSE), UNSWEmail verificata su cse.unsw.edu.au
- Isaac BalbinAssociate Professor of Database Systems, RMIT UniversityEmail verificata su rmit.edu.au
- Graeme PortUniversity of MelbourneEmail verificata su unimelb.edu.au
- Michelle BlomSchool of Computing and Information Systems, The University of MelbourneEmail verificata su unimelb.edu.au
- Graeme GangeMonash UniversityEmail verificata su monash.edu
- Manuel HermenegildoIMDEA Software Institute and Technical U. of Madrid (UPM)Email verificata su upm.es
- Peter SchachteSchool of Computing and Information Systems, University of MelbourneEmail verificata su unimelb.edu.au
- Prof R KotagiriRetired Professor,Email verificata su acm.org