Crea il mio profilo
Accesso pubblico
Visualizza tutto0 articoli
10 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Kento AidaNational Institute of InformaticsEmail verificata su nii.ac.jp
- Ichiro SatohNational Institute of InformaticsEmail verificata su nii.ac.jp
- Kimitoshi TakahashiCluster Computing Inc.Email verificata su ccmp.jp
- Atsuko TakefusaNational Institute of InformaticsEmail verificata su nii.ac.jp
- Sisi DuanResearch Scientist, PhD Advisor, Tsinghua UniversityEmail verificata su mail.tsinghua.edu.cn
- Markus UllrichResearch Associate; University of Applied Sciences Zittau/GörlitzEmail verificata su hszg.de
- Martin GaedkeChemnitz University of TechnologyEmail verificata su informatik.tu-chemnitz.de
- Cheng YangShanghai University of Electric PowerEmail verificata su shiep.edu.cn
- Giancarlo FortinoFull Prof. of Computer Engineering, University of Calabria, FIEEE, FAAIA, Highly Cited ResearcherEmail verificata su unical.it
- Jason J. JungChung-Ang UniversityEmail verificata su cau.ac.kr
- Antonio GuerrieriItalian National Research Council - ICAR-CNR, Università della CalabriaEmail verificata su icar.cnr.it
- Yuan Yuan (袁圆)Guangdong Polytechnic Normal UniversityEmail verificata su szu.edu.cn
- Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisEmail verificata su lbl.gov
- Jerry CaoSingapore Management UniversityEmail verificata su smu.edu.sg