Crea il mio profilo
Accesso pubblico
Visualizza tutto15 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Martin JaggiEPFLEmail verificata su epfl.ch
- Sebastian Urban StichCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Ahad N. ZehmakanThe Australian National UniversityEmail verificata su anu.edu.au
- Franz AurenhammerProfessor for Theoretical Computer Science, TU Graz, AustriaEmail verificata su igi.tugraz.at
- Hemant TyagiResearcher, Inria Lille - Nord EuropeEmail verificata su inria.fr
- Christian L. MüllerHelmholtz Munich; Ludwig-Maximilians-Universität München; Flatiron Institute, New YorkEmail verificata su helmholtz-munich.de
- Bernhard von StengelProfessor of Mathematics, London School of EconomicsEmail verificata su nash.lse.ac.uk
- Ioannis EmirisAthena Research Center; and National & Kapodistrian University of AthensEmail verificata su di.uoa.gr
- Günter M. ZieglerProfessor of Mathematics, BerlinEmail verificata su math.fu-berlin.de
- Manuel KohlerETH ZurichEmail verificata su bsse.ethz.ch
- Jérôme DohrauETH ZurichEmail verificata su inf.ethz.ch
- Jan FoniokGoogle SwitzerlandEmail verificata su google.com
- Vissarion FisikopoulosDept Informatics & Telecoms, University of Athens, GreeceEmail verificata su di.uoa.gr
- jozsef solymosiUniversity of British ColumbiaEmail verificata su math.ubc.ca
- Francisco Valero-CuevasProfessor, University of Southern CaliforniaEmail verificata su usc.edu
- Brian CohnChief Scientist, KaspectEmail verificata su kaspect.com
- Martin HenkTU Berlin, Institut für MathematikEmail verificata su math.tu-berlin.de
- Samarjit ChakrabortyKenan Professor of Computer Science, The University of North Carolina at Chapel HillEmail verificata su cs.unc.edu
- Antonis ThomasPhD Student, ETH ZürichEmail verificata su inf.ethz.ch
- Anastasios KyrillidisAssistant Professor, Computer Science Department, Rice UniversityEmail verificata su rice.edu
Segui