Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Harald SøndergaardComputing and Information Systems, The University of MelbourneEmail verificata su unimelb.edu.au
- Neil JonesEmail verificata su diku.dk
- Lars BirkedalDept. of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Stephan DiehlProfessor of Computer Science, University of TrierEmail verificata su uni-trier.de
- Martin ElsmanProfessor, DIKUEmail verificata su di.ku.dk
- Pieter HartelProfessor Emeritus Cyber securityEmail verificata su tudelft.nl
- Sergei A. RomanenkoResearcher, Keldysh Institute of Applied MathematicsEmail verificata su supercompilers.ru
- Andrzej WąsowskiProfessor, IT University of Copenhagen, DenmarkEmail verificata su itu.dk
- Thomas BøgholmAalborg UniversitetEmail verificata su cs.aau.dk
- Lone Leth ThomsenAssociate Professor, Department of Computer Science, Aalborg UniversityEmail verificata su acm.org
- Bent ThomsenProfessor (MSO), Aalborg UniversityEmail verificata su acm.org
- David Thrane ChristiansenDeon DigitalEmail verificata su deondigital.com
- Anne Louise GimsingDanish Ministry of EnvironmentEmail verificata su mim.dk
- Sebastien Vaucouleurvaucouleur.comEmail verificata su vaucouleur.com
- Ebbe Sloth AndersenAssociate Professor, Aarhus UniversityEmail verificata su inano.au.dk
- Jakob Hull HavgaardUniversity of CopenhagenEmail verificata su rth.dk
- Claudio RussoMicrosoft Research LtdEmail verificata su microsoft.com
- Filip SieczkowskiHeriot-Watt UniversityEmail verificata su hw.ac.uk
- Wensheng DouProfessor, Institute of Software Chinese Academy of Sciences (ISCAS)Email verificata su iscas.ac.cn
- Ken Friis LarsenAssociate professor, Department of Computer Science, University of CopenhagenEmail verificata su diku.dk