Crea il mio profilo
Accesso pubblico
Visualizza tutto32 articoli
7 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Weidong ShiUniversity of HoustonEmail verificata su uh.edu
- Lei XuComputer Science Department, Kent State UniversityEmail verificata su kent.edu
- Zhimin GaoAuburn University at MontgomeryEmail verificata su aum.edu
- Guochuan ZhangZhejiang UniversityEmail verificata su zju.edu.cn
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsEmail verificata su uccs.edu
- Nicole MegowProfessor of Mathematics and Computer Science, University of BremenEmail verificata su uni-bremen.de
- Klaus JansenProfessor, Computer Science, University of KielEmail verificata su informatik.uni-kiel.de
- Dániel MarxCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Kevin SchewiorUniversity of Southern Denmark, Department of Mathematics and Computer ScienceEmail verificata su sdu.dk
- Leen StougieSenior Researcher CWI, Prof. of Operations Research Vrije Universiteit, AmsterdamEmail verificata su cwi.nl
- José VerschaeAssociate Professor, Pontificia Universidad Católica de ChileEmail verificata su uc.cl
- Martin GroßRWTH AachenEmail verificata su oms.rwth-aachen.de
- Yann DisserProfessor for Combinatorial Optimization, Department of Mathematics, TU DarmstadtEmail verificata su mathematik.tu-darmstadt.de
Segui
Lin Chen
Department of computer science, Texas Tech University
Email verificata su ttu.edu - Home page