Crea il mio profilo
Accesso pubblico
Visualizza tutto26 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Peter ChristenProfessor, Australian National University, and University of EdinburghEmail verificata su anu.edu.au
- Rainer SchnellUniversität Duisburg-EssenEmail verificata su uni-due.de
- Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityEmail verificata su mq.edu.au
- Anushka VidanageResearch Fellow, Software Innovation Institute, The Australian National UniversityEmail verificata su anu.edu.au
- Ming DingPrincipal Research Scientist & Science Lead, CSIRO, AU; Adjunct Professor@Swinburne; Editor@COMSTEmail verificata su data61.csiro.au
- Charini NanayakkaraSenior Research Officer at the Australian National UniversityEmail verificata su anu.edu.au
- Sirintra VaiwsriLecturer, King Mongkut's University of Technology North BangkokEmail verificata su itm.kmutnb.ac.th
- Jun LiNanjing University of Science and TechnologyEmail verificata su njust.edu.cn
- Nishadi KiriellePhD StudentEmail verificata su anu.edu.au
- Thierry RakotoariveloPrincipal Research Scientist, Data61, CSIROEmail verificata su data61.csiro.au
- Guihai ChenProfessor of Computer ScienceEmail verificata su nju.edu.cn
- Chuan MaAssociate Professor, School of Computer Science, Chongqing UniversityEmail verificata su cqu.edu.cn
- Kang Wei (韦康)PolyU; NJUSTEmail verificata su polyu.edu.hk
- Kee Siong NgAustralian National University / Australian Public ServiceEmail verificata su anu.edu.au
- Sean RandallDeakin UniversityEmail verificata su deakin.edu.au
- Vassilios VerykiosHellenic Open University, GREECEEmail verificata su eap.gr
- Yang Li (Kelvin)Deakin UniversityEmail verificata su deakin.edu.au
- Michael PurcellSenior Fellow, The Australian National UniversityEmail verificata su anu.edu.au
- Timothy GrahamQueensland University of TechnologyEmail verificata su qut.edu.au
- toni makkaiaustralian national universityEmail verificata su anu.edu.au