Crea il mio profilo
Accesso pubblico
Visualizza tutto0 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Asadollah ShahbahramiProf. Computer Eng., University of Guilan, University of Groningen, University of Guilan, TUDelftEmail verificata su guilan.ac.ir
- Amir H. GandomiProfessor, University of Technology Sydney, Obuda UniversityEmail verificata su msu.edu
- Jun ShenUniversity of WollongongEmail verificata su uow.edu.au
- Wolfgang BanzhafKoza Chair in Genetic Programming, Michigan State University, USAEmail verificata su msu.edu
- Amirhessam TahmassebiPhD in Computational Science, Department of Scientific Computing, Florida State UniversityEmail verificata su FSU.edu
- Mahdi FahmidehSenior Lecturer (Assistant Professor) in Cyber Security at University of Southern QueenslandEmail verificata su usq.edu.au
- Bo DuDepartment of Business Strategy and Innovation, Griffith Business SchoolEmail verificata su griffith.edu.au
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioEmail verificata su utsa.edu
- Georgi GaydadjievProfessor in Computer Architecture, University of GroningenEmail verificata su rug.nl
- Peng WangProfessor, University of Electronic Science and Technology of China
Segui
Akbar Telikani
School of Computing and Information Technology, University of Wollongong, Australia
Email verificata su uow.edu.au