Crea il mio profilo
Accesso pubblico
Visualizza tutto20 articoli
18 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Murat SensoyDepartment of Computer Science, University College LondonEmail verificata su ucl.ac.uk
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteEmail verificata su cardiff.ac.uk
- Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKEmail verificata su abdn.ac.uk
- Gavin PearsonDstlEmail verificata su dstl.gov.uk
- Diego PizzocaroHonorary Research Fellow, Cardiff University, UKEmail verificata su cs.cardiff.ac.uk
- Thomas La PortaPenn State UniversityEmail verificata su cse.psu.edu
- Dave BrainesIBM Research, UKEmail verificata su uk.ibm.com
- Mario Gómez MartínezAssociate Professor (UPV)Email verificata su dsic.upv.es
- Lance KaplanArmy Research LaboratoryEmail verificata su mail.mil
- Matthew P. JohnsonDepartment of CS, Lehman College, CUNYEmail verificata su ucla.edu
- Hosam RowaihyAssistant Professor of Computer Engineering, King Fahd University of Petroleum and MineralsEmail verificata su kfupm.edu.sa
- Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneEmail verificata su capitalone.com
- Federico CeruttiUniversity of BresciaEmail verificata su unibs.it
- Christopher GibsonIBM Research, IBM UKEmail verificata su uk.ibm.com
- Alice TonioloUniversity of St AndrewsEmail verificata su st-andrews.ac.uk
- Yuqing TangFacebook AIEmail verificata su fb.com
- Christos ParizasPhD candidate, Computer Science, Cardiff UniversityEmail verificata su cardiff.ac.uk
- Ron RudnickiSr. Research Scientist, CUBRC, Inc., BuffaloEmail verificata su cubrc.org
- Chatschik BisdikianIBM ResearchEmail verificata su us.ibm.com
- Dominic HarriesIBMEmail verificata su uk.ibm.com