Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Marcus MagnorProfessor of Computer Science, TU Braunschweig, L3S Research CenterEmail verificata su cg.cs.tu-bs.de
- Stefan GutheThreedyEmail verificata su threedy.io
- Kentaro ToyamaUniversity of Michigan, School of InformationEmail verificata su umich.edu
- Jeremy BirnholtzNorthwestern UniversityEmail verificata su northwestern.edu
- Carl GutwinUniversity of SaskatchewanEmail verificata su cs.usask.ca
- Agha Ali RazaAssistant Professor, Lahore University of Management Sciences (LUMS), Lahore, Pakistan.Email verificata su lums.edu.pk
- Richard J. AndersonProfessor of Computer Science and Engineering, University of WashingtonEmail verificata su cs.washington.edu
- Michael GoeseleMeta Reality Labs ResearchEmail verificata su goesele.org
- Florian SchaubUniversity of MichiganEmail verificata su umich.edu
- Tawfiq AmmariAssistant Professor, Rutgers University School of Communication and InformationEmail verificata su umich.edu
- Katharina KrombholzFaculty, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Hadia MajidLahore University of Management SciencesEmail verificata su lums.edu.pk
- Mustafa NaseemClinical Assistant Professor, University of MichiganEmail verificata su umich.edu