Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Grace NgaiDepartment of Computing, Hong Kong Polytechnic UniversityEmail verificata su polyu.edu.hk
- Andreas BullingProfessor of Computer Science, University of StuttgartEmail verificata su vis.uni-stuttgart.de
- Jiajia LiResearch Scholar, Guangdong University of TechnologyEmail verificata su comp.polyu.edu.hk
- Tiffany CK KwokgeoGAZElab, ETH ZurichEmail verificata su ethz.ch
- Philipp MüllerSenior Researcher, DFKI, Saarland Informatics CampusEmail verificata su dfki.de
- Julian SteilRobert Bosch GmbHEmail verificata su de.bosch.com
- Xucong ZhangAssistant Professor, Delft University of TechnologyEmail verificata su tudelft.nl
- Inken HagestedtCispa Helmholtz Center for Information SecurityEmail verificata su uni-saarland.de
- Kenneth W.K. LoMPhil, Department of Computing, The Hong Kong Polytechnic UniversityEmail verificata su polyu.edu.hk
- Yusuke SuganoInstitute of Industrial Science, The University of TokyoEmail verificata su iis.u-tokyo.ac.jp
- Kien HuaProfessor of CS, University of Central FloridaEmail verificata su cs.ucf.edu
- Daniel BuschekUniversity of BayreuthEmail verificata su uni-bayreuth.de