Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Thomas E. KellerUniversity of South FloridaEmail verificata su usf.edu
- Teresa M. HarrisonProfessor of Communication, University at AlbanyEmail verificata su albany.edu
- Catherine Dumas PhDAssistant Professor, Simmons University, Boston UniversityEmail verificata su simmons.edu
- Daniel LaMannaStudent of Computer Science, University at AlbanyEmail verificata su albany.edu
- Nic DePaulaWayne State UniversityEmail verificata su wayne.edu
- Ryan ScharfEmail verificata su mail.usf.edu
- Ozlem UzunerGeorge Mason UniversityEmail verificata su gmu.edu
- Fatima K. Espinoza VasquezUniversity of KentuckyEmail verificata su uky.edu
- Feng ChenDepartment of Computer Science, UT DallasEmail verificata su utdallas.edu
- S. S. RaviResearch Professor, Biocomplexity Institute, University of VirginiaEmail verificata su virginia.edu
- Tim FakeOptiv Cybersecurity, University at AlbanyEmail verificata su albany.edu
- James E. Andrews, Ph.D.Professor, University of South Florida, School of InformationEmail verificata su usf.edu
- Luis Felipe Luna-ReyesProfessor of Public Administration and Policy (University at Albany)Email verificata su albany.edu
- Muhammad Abdul-MageedThe University of British ColumbiaEmail verificata su ubc.ca
- Abebe RorissaProfessor & Director, School of Information SciencesEmail verificata su tennessee.edu
- William MayAtmospheric Sciences Research CenterEmail verificata su albany.edu
- Lisa FedererNational Library of MedicineEmail verificata su nih.gov
- Jisue LeeAssociate Professor, Chonnam National University, South KoreaEmail verificata su jnu.ac.kr
- Ersin DincelliAssistant Professor of Information Systems | University of Colorado DenverEmail verificata su ucdenver.edu
- Soon Ae ChunProfessor of IS/Informatics, Graduate Comp Sci & Data Sci, CUNY, College of Staten IslandEmail verificata su csi.cuny.edu
Segui