Crea il mio profilo
Accesso pubblico
Visualizza tutto17 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mark de BergProfessor of Computer Science, TU EindhovenEmail verificata su win.tue.nl
- Hans L. BodlaenderProfessor Computer Science, Utrecht UniversityEmail verificata su uu.nl
- Dániel MarxCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Tom C. van der ZandenMaastricht UniversityEmail verificata su maastrichtuniversity.nl
- Karl BringmannProfessor in Computer Science, Saarland UniversityEmail verificata su cs.uni-saarland.de
- Sudeshna KolayIIT KharagpurEmail verificata su cse.iitkgp.ac.in
- Jesper NederlofUtrecht UniversityEmail verificata su uu.nl
- Gerhard WoegingerProfessor of Computer Science, RWTH AachenEmail verificata su cs.rwth-aachen.de
- Erik Jan van LeeuwenUtrecht University, The NetherlandsEmail verificata su uu.nl
- Karol WęgrzyckiSaarland University and Max Planck Institute for InformaticsEmail verificata su cs.uni-saarland.de
- Antonios AntoniadisAssistant Professor, DMMP group, University of TwenteEmail verificata su utwente.nl
- André NusserUniversity of CopenhagenEmail verificata su mpi-inf.mpg.de
- Marvin KünnemannPostdoc at Max Planck Institute for Informatics, Saarbrücken, GermanyEmail verificata su mpi-inf.mpg.de
- Zoltán KirályELTE Eötvös Loránd UniversityEmail verificata su cs.elte.hu
- Morteza MonemizadehAssistant Professor at Eindhoven University of Technology, the NetherlandsEmail verificata su tue.nl
- Leonidas TheocharousEindhoven University of TechnologyEmail verificata su tue.nl
- Zahra ParsaeianUniversity of Freiburg, GermanyEmail verificata su cs.uni-freiburg.de
- Michał PilipczukUniversity of WarsawEmail verificata su mimuw.edu.pl
- Péter GyörgyiInstitute for Computer Science and Control (MTA SZTAKI)Email verificata su sztaki.hu
- Kevin SchewiorUniversity of Southern Denmark, Department of Mathematics and Computer ScienceEmail verificata su sdu.dk