Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Rainhard Dieter FindlingFormer Researcher in the Ambient Intelligence Group, Aalto UniversityEmail verificata su aalto.fi
- Michael RolandJohannes Kepler University Linz, Institute of Networks and SecurityEmail verificata su ins.jku.at
- Muhammad MuaazResearcherEmail verificata su uia.no
- Hans GellersenProfessor of Interactive Systems, Lancaster University and Aarhus UniversityEmail verificata su cs.au.dk
- Alois FerschaProfessor of Computer Science, JKUEmail verificata su jku.at
- Daniel HintzeGoogleEmail verificata su hintze-it.de
- Bogdan GrozaPolitehnica University of TimisoaraEmail verificata su aut.upt.ro
- Eckhard KochProfessor & Dekan für Informatik, Fachhochschule der WirtschaftEmail verificata su fhdw.de
- Andreas AichhornResearch and Development / Company Sprecher AutomationEmail verificata su sprecher-automation.com
- Iulia IonGoogleEmail verificata su google.com
- Mike HazasProfessor, Uppsala UniversityEmail verificata su it.uu.se
- Clemens HolzmannUniversity of Applied Sciences Upper AustriaEmail verificata su fh-hagenberg.at
- Michael AffenzellerUniversity of Applied Sciences Upper AustriaEmail verificata su fh-ooe.at
- Adriana BerdichPolitehnica University of TimisoaraEmail verificata su aut.upt.ro
- Philipp HoferJohannes Kepler University, Institute of Networks and SecurityEmail verificata su ins.jku.at
- Bernhard EtzlingerResearcher, Johannes Kepler University LinzEmail verificata su jku.at
- Stephan SiggAssociate Professor, Aalto UniversityEmail verificata su aalto.fi
- Jürgen Fuß (Ecker)Professor of Applied Mathematics and CryptographyEmail verificata su fh-hagenberg.at
- Manuel RiggerNational University of SingaporeEmail verificata su comp.nus.edu.sg
- Andreas MöllerTechnische Universität MünchenEmail verificata su tum.de