Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- João Paulo A. AlmeidaFederal University of Espirito Santo, BrazilEmail verificata su inf.ufes.br
- John MylopoulosUniversity of OttawaEmail verificata su cs.toronto.edu
- Renata GuizzardiUniversity of TwenteEmail verificata su utwente.nl
- Giancarlo GuizzardiChair of Semantics, Cybersecurity & Services (SCS), University of Twente, EEMCS, The NetherlandsEmail verificata su inf.ufes.br
- Paolo GiorginiProfessor of Computer Science, University of TrentoEmail verificata su unitn.it
- Jennifer HorkoffUniversity of Gothenburg/Chalmers University of TechnologyEmail verificata su chalmers.se
- Mattia SalnitriResearch Fellow at Politecnico di MilanoEmail verificata su polimi.it
- Tong Li (李童)Associate Professor, Beijing University of TechnologyEmail verificata su bjut.edu.cn
- Alejandro MateAssociate Professor at University of Alicante (UA)Email verificata su dlsi.ua.es
- Elda PajaAssociate Professor, IT University of CopenhagenEmail verificata su itu.dk
- Fatma Başak AydemirAssistant Professor, Utrecht UniversityEmail verificata su uu.nl
- Feng-Lin LiUniversity of TrentoEmail verificata su unitn.it
- Luca PirasSenior Lecturer of Software Engineering, Privacy and Gamification at Middlesex University (UK)Email verificata su mdx.ac.uk
- Fabiano DalpiazDept. of Information and Computing Sciences, Utrecht UniversityEmail verificata su uu.nl
- João Henrique C. PimentelProfessor at Universidade Federal Rural de PernambucoEmail verificata su cin.ufpe.br
- Paulo Sérgio dos Santos JuniorProfessor of Computer Science, Federal Institute of Espirito SantoEmail verificata su ifes.edu.br
- Katsiaryna (Kate) LabunetsUtrecht UniversityEmail verificata su uu.nl
- Roberto SebastianiFull Professor in Computer Science, DISI, University of Trento, ItalyEmail verificata su unitn.it