Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ernst BiersackEmail verificata su eurecom.fr
- Matteo VarvelloResearcher at Bell LabsEmail verificata su nokia.com
- Martin FlackAkamai Technologies, Inc.Email verificata su akamai.com
- Taoufik EN-NAJJARYOrange LabsEmail verificata su orange.com
- Utkarsh GoelAkamaiEmail verificata su akamai.com
- Zhi-Li ZhangDistinguished McKnight University Professor and Qwest Chair ProfessorEmail verificata su cs.umn.edu
- Mike WittieMontana State UniversityEmail verificata su montana.edu
- Yang GuoNISTEmail verificata su nist.gov
- Vijay Kumar AdhikariUniversity of MinnesotaEmail verificata su cs.umn.edu
- Damiano CarraUniversity of Verona, Verona, (Italy)Email verificata su univr.it
- Thorsten HolzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Ivica RimacNokia Bell LabsEmail verificata su nokia-bell-labs.com
- Yanhua LiAssociate Professor at Worcester Polytechnic InstituteEmail verificata su wpi.edu
- Jie BaoJDTEmail verificata su jd.com
- Keith RossProfessor of Computer Science, NYU Abu DhabiEmail verificata su nyu.edu
- Prithula DhungelEmail verificata su akamai.com
- Vijay K. GurbaniIllinois Institute of Technology / Vail SystemsEmail verificata su iit.edu
- Xiaojun HeiSchool of Electronic Information and Communications, Huazhong University of Science and TechnologyEmail verificata su hust.edu.cn
- Wolfgang EffelsbergProfessor of Computer Science, University of MannheimEmail verificata su informatik.uni-mannheim.de
- Pietro MichiardiEURECOMEmail verificata su eurecom.fr