Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Javier del Prado PavonSTEricssonEmail verificata su st.com
- Kiran ChallapaliPhilips Research North AmericaEmail verificata su philips.com
- Stefan MangoldLovefield Wireless GmbHEmail verificata su lfield.ch
- Mihaela van der SchaarUniversity of Cambridge, The Alan Turing InstituteEmail verificata su ee.ucla.edu
- Dagnachew BirruPhilips ResearchEmail verificata su philips.com
- Kang G. ShinKevin & Nancy O'Connor Professor of Computer Science, University of MichiganEmail verificata su umich.edu
- Joerg HabethaPhilips ResearchEmail verificata su philips.com
- Mainak ChatterjeeApple Inc.Email verificata su apple.com
- SHAMIK SENGUPTAExecutive Director, UNR Cybersecurity Center & Professor of Computer Science and Engineering Dept.Email verificata su unr.edu
- Swastik BrahmaAssociate Professor, Department of Computer Science, University of CincinnatiEmail verificata su ucmail.uc.edu
- Hyoil KimProfessor, Dept. of EE, UNIST (Ulsan National Institute of Science and Technology)Email verificata su unist.ac.kr
- Hwangnam KimProfessor, Korea UniversityEmail verificata su korea.ac.kr
- Xin LiuProfessor of Compuer Science, University of California, DavisEmail verificata su ucdavis.edu
- Monisha GhoshUniversity Of Notre DameEmail verificata su nd.edu
- Ivo AdanProfessor Manufacturing Networks, Technische Universiteit EindhovenEmail verificata su tue.nl
- Sem BorstHoogleraar Wiskunde, Technische Universiteit EindhovenEmail verificata su tue.nl
- WEI ZHOUCisco SystemsEmail verificata su cisco.com
- Xiaofei WangProfessor - Tianjin UniversityEmail verificata su tju.edu.cn
- Solomon TraininQualcomm retired