Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Cas CremersCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Sam ScottCornell TechEmail verificata su cornell.edu
- Thyla van der MerweRoyal Holloway, University of LondonEmail verificata su live.rhul.ac.uk
- Jonathan HoylandRoyal HollowayEmail verificata su live.rhul.ac.uk
- Jyotirmoy V. DeshmukhAssociate Professor, University of Southern CaliforniaEmail verificata su usc.edu
- Rupak MajumdarMPI for Software SystemsEmail verificata su mpi-sws.org
- Xiaoqing JinApple Inc.Email verificata su cs.ucr.edu
- Vinayak S. PrabhuColorado State UniversityEmail verificata su colostate.edu
- Zvonko IljazovićDepartment of Mathematics, Faculty of Science, University of ZagrebEmail verificata su math.pmf.unizg.hr
- David BasinProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Vedran ČačićDepartment of Mathematics, Faculty of Science, University of ZagrebEmail verificata su math.pmf.unizg.hr
- Petar ParadžikUniversity of Zagreb Faculty of Electrical Engineering and ComputingEmail verificata su fer.unizg.hr
- Ante DerekAssociate Professor, University of Zagreb Faculty of Electrical Engineering and ComputingEmail verificata su fer.unizg.hr
Segui
Marko Horvat
Department of Mathematics, Faculty of Science, University of Zagreb
Email verificata su math.pmf.unizg.hr