Crea il mio profilo
Accesso pubblico
Visualizza tutto21 articoli
8 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Christel BaierTU DresdenEmail verificata su tu-dresden.de
- Sascha KlüppelholzWissenschaftlicher Mitarbeiter (PostDoc) Technische Universität DresdenEmail verificata su tcs.inf.tu-dresden.de
- Clemens DubslaffEindhoven University of Technology | CeTI (TU Dresden)Email verificata su tue.nl
- Steffen MärckerFaculty of Computer Science, TU DresdenEmail verificata su tu-dresden.de
- David ParkerProfessor of Computer Science, University of OxfordEmail verificata su cs.ox.ac.uk
- Sascha WunderlichTU DresdenEmail verificata su tu-dresden.de
- Jan KřetínskýMasaryk University Brno; Technical University of MunichEmail verificata su fi.muni.cz
- Wolfgang LeisterActing Research Director, Norsk RegnesentralEmail verificata su nr.no
- Jan StrejčekMasaryk UniversityEmail verificata su fi.muni.cz
- Alexandre Duret-LutzLRE / EPITAEmail verificata su lrde.epita.fr
- František BlahoudekPure StorageEmail verificata su fi.muni.cz
- Tim QuatmannRWTH Aachen UniversityEmail verificata su cs.rwth-aachen.de
- Michaela KlauckRobert Bosch GmbH - Bosch Research, Saarland University, Saarland Informatics CampusEmail verificata su de.bosch.com
- Arnd HartmannsUniversity of TwenteEmail verificata su utwente.nl
- Ernst Moritz HahnUniversity of TwenteEmail verificata su utwente.nl
- Marcus VölpCritiX Lab, Interdisciplinary Centre for Security, Reliability and Trust, University of LuxembourgEmail verificata su uni.lu
- Hermann HärtigProfessor Computer Science, Technische Universität DresdenEmail verificata su tu-dresden.de
- James WorrellProfessor of Computer Science, Oxford UniversityEmail verificata su cs.ox.ac.uk
- Stefan KieferProfessor of Computer Science, University of OxfordEmail verificata su cs.ox.ac.uk
- Sebastian JungesAssistant Professor, Radboud University, NijmegenEmail verificata su ru.nl