Crea il mio profilo
Accesso pubblico
Visualizza tutto76 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nicola ZannoneEindhoven University of TechnologyEmail verificata su tue.nl
- John MylopoulosUniversity of OttawaEmail verificata su cs.toronto.edu
- Luca AllodiEindhoven University of TechnologyEmail verificata su tue.nl
- Paolo GiorginiProfessor of Computer Science, University of TrentoEmail verificata su unitn.it
- Federica PaciDepartment of Computer Science, University of VeronaEmail verificata su univr.it
- Olga GadyatskayaAssociate professor at LIACS, Leiden UniversityEmail verificata su liacs.leidenuniv.nl
- Nicola DragoniDeputy Director, Head of Section, Professor @ DTU ComputeEmail verificata su dtu.dk
- Ivan PashchenkoResearch Assistant Professor, University of TrentoEmail verificata su unitn.it
- Julian WilliamsProfessor of Accounting and Finance, Durham UniversityEmail verificata su durham.ac.uk
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenEmail verificata su cs.kuleuven.be
- Antonino SabettaSAP Security ResearchEmail verificata su sap.com
- Katsiaryna (Kate) LabunetsUtrecht UniversityEmail verificata su uu.nl
- Hristo KoshutanskiAtos Research & Innovation, SpainEmail verificata su atos.net
- Duc-Ly VuLecturer at Eastern International UniversityEmail verificata su eiu.edu.vn
- Giampaolo BellaUniversity of CataniaEmail verificata su dmi.unict.it
- Nataliia BielovaResearch Scientist at Inria (ex-CNIL)Email verificata su inria.fr
- Ida SiahaanChair of Automata Theory - TU DresdenEmail verificata su tu-dresden.de
- Artsiom YautsiukhinIIT-CNREmail verificata su iit.cnr.it
- Lawrence PaulsonUniversity of CambridgeEmail verificata su cam.ac.uk
- Woohyun ShimKorea Institute of Public AdministrationEmail verificata su kipa.re.kr