Crea il mio profilo
Accesso pubblico
Visualizza tutto49 articoli
9 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Matthew S ShieldsEmail verificata su simbachain.com
Ewa DeelmanUniversity of Southern California, Information Sciences InstituteEmail verificata su isi.edu
Jarek NabrzyskiUniversity of Notre DameEmail verificata su nd.edu
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteEmail verificata su cardiff.ac.uk
Vlado StankovskiFull Professor, University of LjubljanaEmail verificata su fri.uni-lj.si
Zhiming ZhaoAssociate professor - University of AmsterdamEmail verificata su uva.nl
Ian KelleyResearcher, Information School, University of WashingtonEmail verificata su uw.edu
Dennis GannonProfessor, Indiana UniversityEmail verificata su indiana.edu
Graham BentNeurosynapse LtdEmail verificata su uk.ibm.com
Omer RanaCardiff University, UKEmail verificata su cardiff.ac.uk
Bertram LudäscherProfessor, School of Information Sciences, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
Joseph MackerSenior Network Scientist, Naval Research LaboratoryEmail verificata su nrl.navy.mil
Tom GoodaleLiverpool John Moores UniversityEmail verificata su ljmu.ac.uk
David M RogersSchool of Computer Science and Informatics, Cardiff UniversityEmail verificata su cs.cardiff.ac.uk
Thilo KielmannAssociate Professor of Computer Science, Vrije Universiteit, AmsterdamEmail verificata su vu.nl
Matthew B. JonesUniversity of California Santa BarbaraEmail verificata su nceas.ucsb.edu
Kacsuk PéterProfessor of Distributed Computing, SZTAKI and Univ.of WestminsterEmail verificata su sztaki.hu
Carlo MastroianniDirector of Research at ICAR-CNREmail verificata su icar.cnr.it
George SuciuUniversity "Politehnica" of Bucharest & BEIA ConsultEmail verificata su beia.ro
Matthew J. TurkUniversity of IllinoisEmail verificata su illinois.edu