Crea il mio profilo
Accesso pubblico
Visualizza tutto16 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Christian KnauerInstitut für Informatik, Universität BayreuthEmail verificata su uni-bayreuth.de
- Sergio CabelloUniversity of Ljubljana and Institute of Mathematics, Physics and MechanicsEmail verificata su fmf.uni-lj.si
- Remco C. Veltkampprofessor of Computer Science, Utrecht UniversityEmail verificata su uu.nl
- René van OostrumAMDEmail verificata su 59bits.nl
- Édouard BonnetENS Lyon, LIP, FranceEmail verificata su ens-lyon.fr
- Joachim GudmundssonUniversity of SydneyEmail verificata su sydney.edu.au
- Sue WhitesidesProfessor of Computer Science, University of Victoria BCEmail verificata su uvic.ca
- Rainer TypkeEuropean CommissionEmail verificata su ec.europa.eu
- Frans WieringUtrecht UniversityEmail verificata su uu.nl
- Dániel MarxCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Helmut AltFreie Universität BerlinEmail verificata su mi.fu-berlin.de
- M FarshiAssociate Prof. of Computer Science, Combinatorial & Geometric Algorithms lab, Yazd UniversityEmail verificata su yazd.ac.ir
- Mark de BergProfessor of Computer Science, TU EindhovenEmail verificata su win.tue.nl
- Florian SikoraLAMSADE, Université Paris-DauphineEmail verificata su dauphine.fr
- Paweł RzążewskiWarsaw University of Technology, Faculty of Mathematics and Information ScienceEmail verificata su mini.pw.edu.pl
- Eun Jung KimLAMSADEEmail verificata su dauphine.fr
- Michael LampisLAMSADE, Université Paris DauphineEmail verificata su dauphine.fr
- Magnus WahlströmRoyal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Frances rosamondUniversity of Bergen, NorwayEmail verificata su uib.no
- Christophe PaulCNRS LIRMMEmail verificata su lirmm.fr