Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jaco van de PolProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Alfons LaarmanLeiden UniversityEmail verificata su liacs.leidenuniv.nl
- Jeroen MeijerEijsinkEmail verificata su eijsink.nl
- Armin BiereProfessor of Computer Science, University of FreiburgEmail verificata su informatik.uni-freiburg.de
- Stefan BlomUniversity of TwenteEmail verificata su utwente.nl
- Gijs KantPhD Student in Computer Science, University of TwenteEmail verificata su cs.utwente.nl
- Keijo HeljankoProfessor of Computer Science, Department of Computer Science, University of HelsinkiEmail verificata su helsinki.fi
- Salomon SickertEmail verificata su tum.de
- Wytse OortwijnTNO-ESIEmail verificata su tno.nl
- Fabrice KordonProfesseur d'Informatique, Sorbonne UniversitéEmail verificata su lip6.fr
- Robert WilleTechnical University of Munich and SCCH GmbHEmail verificata su tum.de
- Robert MeolicHead of IT at OperatoEmail verificata su meolic.com
- Marielle StoelingaProfessor of Risk Management for high tex systems, Radboud University & University of TwenteEmail verificata su utwente.nl
- David N. JansenRadboud Universiteit NijmegenEmail verificata su cs.ru.nl
- Ernst Moritz HahnUniversity of TwenteEmail verificata su utwente.nl
- Andrea TurriniInstitute of Software, Chinese Academy of SciencesEmail verificata su ios.ac.cn
- Thomas NeeleAssistant Professor, Eindhoven University of TechnologyEmail verificata su tue.nl
- Lijun ZhangEmail verificata su ios.ac.cn
- Guillermo A. PérezAssociate Professor, University of AntwerpEmail verificata su uantwerp.be
- Robert RubbensUniversity of TwenteEmail verificata su student.utwente.nl