Crea il mio profilo
Accesso pubblico
Visualizza tutto49 articoli
9 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Ewa DeelmanUniversity of Southern California, Information Sciences InstituteEmail verificata su isi.edu
Jarek NabrzyskiUniversity of Notre DameEmail verificata su nd.edu
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteEmail verificata su cardiff.ac.uk
Ian KelleyResearcher, Information School, University of WashingtonEmail verificata su uw.edu
Vlado StankovskiFull Professor, University of LjubljanaEmail verificata su fri.uni-lj.si
Zhiming ZhaoAssociate professor - University of AmsterdamEmail verificata su uva.nl
Dennis GannonProfessor, Indiana UniversityEmail verificata su indiana.edu
Omer RanaCardiff University, UKEmail verificata su cardiff.ac.uk
Graham BentNeurosynapse LtdEmail verificata su uk.ibm.com
Bertram LudäscherProfessor, School of Information Sciences, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
Joseph MackerSenior Network Scientist, Naval Research LaboratoryEmail verificata su nrl.navy.mil
Tom GoodaleLiverpool John Moores UniversityEmail verificata su ljmu.ac.uk
David M RogersSchool of Computer Science and Informatics, Cardiff UniversityEmail verificata su cs.cardiff.ac.uk
Thilo KielmannAssociate Professor of Computer Science, Vrije Universiteit, AmsterdamEmail verificata su vu.nl
Kacsuk PéterProfessor of Distributed Computing, SZTAKI and Univ.of WestminsterEmail verificata su sztaki.hu
Carlo MastroianniDirector of Research at ICAR-CNREmail verificata su icar.cnr.it
Matthew B. JonesUniversity of California Santa BarbaraEmail verificata su nceas.ucsb.edu
George SuciuUniversity "Politehnica" of Bucharest & BEIA ConsultEmail verificata su beia.ro
Matthew J. TurkUniversity of IllinoisEmail verificata su illinois.edu
Adam BrinckmanSenior Research Programmer, University of Notre DameEmail verificata su nd.edu