Crea il mio profilo
Accesso pubblico
Visualizza tutto49 articoli
9 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Matthew S ShieldsEmail verificata su simbachain.com
- Ewa DeelmanUniversity of Southern California, Information Sciences InstituteEmail verificata su isi.edu
- Jarek NabrzyskiUniversity of Notre DameEmail verificata su nd.edu
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteEmail verificata su cardiff.ac.uk
- Ian KelleyResearcher, Information School, University of WashingtonEmail verificata su uw.edu
- Vlado StankovskiFull Professor, University of LjubljanaEmail verificata su fri.uni-lj.si
- Zhiming ZhaoAssociate professor - University of AmsterdamEmail verificata su uva.nl
- Dennis GannonProfessor, Indiana UniversityEmail verificata su indiana.edu
- Omer RanaCardiff University, UKEmail verificata su cardiff.ac.uk
- Graham BentNeurosynapse LtdEmail verificata su uk.ibm.com
- Bertram LudäscherProfessor, School of Information Sciences, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Joseph MackerSenior Network Scientist, Naval Research LaboratoryEmail verificata su nrl.navy.mil
- Tom GoodaleLiverpool John Moores UniversityEmail verificata su ljmu.ac.uk
- David M RogersSchool of Computer Science and Informatics, Cardiff UniversityEmail verificata su cs.cardiff.ac.uk
- Thilo KielmannAssociate Professor of Computer Science, Vrije Universiteit, AmsterdamEmail verificata su vu.nl
- Kacsuk PéterProfessor of Distributed Computing, SZTAKI and Univ.of WestminsterEmail verificata su sztaki.hu
- Matthew B. JonesUniversity of California Santa BarbaraEmail verificata su nceas.ucsb.edu
- Carlo MastroianniDirector of Research at ICAR-CNREmail verificata su icar.cnr.it
- George SuciuUniversity "Politehnica" of Bucharest & BEIA ConsultEmail verificata su beia.ro
- Matthew J. TurkUniversity of IllinoisEmail verificata su illinois.edu