Crea il mio profilo
Accesso pubblico
Visualizza tutto25 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Anuj DawarUniversity of CambridgeEmail verificata su cl.cam.ac.uk
- Phokion KolaitisDistinguished Research Professor, UC Santa Cuz and Principal Research Staff Member, IBM ResearchEmail verificata su ucsc.edu
- Martin GroheProfessor of Computer Science, RWTH Aachen UniversityEmail verificata su informatik.rwth-aachen.de
- Maria Luisa BonetLSI, UPCEmail verificata su lsi.upc.edu
- Andrei BulatovSimon Fraser UniversityEmail verificata su sfu.ca
- Jakob NordströmUniversity of Copenhagen and Lund UniversityEmail verificata su di.ku.dk
- Victor DalmauDepartment of Information and Communication Technologies, Universitat Pompeu FabraEmail verificata su upf.edu
- Moritz MüllerEmail verificata su uni-passau.de
- Elitza ManevaAutonomous University of Barcelona (UAB)Email verificata su berkeley.edu
- Dániel MarxCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Simone SeveriniAWS/UCLEmail verificata su ucl.ac.uk
- Nicola GalesiSapienza University RomeEmail verificata su uniroma1.it
- David E. RobersonTechnical University of DenmarkEmail verificata su dtu.dk
- Laura MančinskaAssociate Professor at QMATH, University of CopenhagenEmail verificata su locc.la
- Robert Samalassociate professor, Computer Science Institute, Charles UniversityEmail verificata su iuuk.mff.cuni.cz
- Johannes K. FichteLinköping UniversityEmail verificata su liu.se
- Moshe Y. VardiRice UniversityEmail verificata su cs.rice.edu
- Ricard GavaldàUniversitat Politècnica de Catalunya + Amalfi AnalyticsEmail verificata su cs.upc.edu
- Tuomas HakoniemiUniversity of HelsinkiEmail verificata su helsinki.fi
- Jose L. BalcazarProfessor, Computer Science, Universitat Politècnica de CatalunyaEmail verificata su upc.edu