Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jianer ChenProfessor of Computer Science, Texas A&M UniversityEmail verificata su cse.tamu.edu
- Jianxin WangSchool of Computer Science and Engineering, Central South universityEmail verificata su mail.csu.edu.cn
- Dániel MarxCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Ke YupingThe Hong Kong Polytechnic UniversityEmail verificata su connect.polyu.hk
- Sandeep RBIndian Institute of Technology DharwadEmail verificata su iitdh.ac.in
- Ye JunjiePh. D. Student, The Chinese University of Hong KongEmail verificata su cse.cuhk.edu.hk
- Hanchun YuanCentral South UniversityEmail verificata su csu.edu.cn
- Xiating OuyangUniversity of Wisconsin-MadisonEmail verificata su cs.wisc.edu
- Martín D. SafeDepartamento de Matemática, Universidad Nacional del Sur & INMABBB (UNS-CONICET)Email verificata su uns.edu.ar
- Luciano N. GrippoUniversidad Nacional de General Sarmiento - CONICETEmail verificata su campus.ungs.edu.ar
- Yota OtachiNagoya UniversityEmail verificata su nagoya-u.jp
- Ashutosh RaiDepartment of Mathematics, IIT DelhiEmail verificata su maths.iitd.ac.in
- Xiaochun CaoSun Yat-sen UniversityEmail verificata su mail.sysu.edu.cn
- Théo PierronUniversité de LyonEmail verificata su univ-lyon1.fr
- Gabriel BathieEcole Normale Supérieure de LyonEmail verificata su ens-lyon.fr
- Nicolas BousquetCNRS, LIRIS, University Lyon 1, Univ. de LyonEmail verificata su liris.cnrs.fr
- Shenghua WangThe Hong Kong Polytechnic UniversityEmail verificata su connect.polyu.hk
- Dhanyamol AntonyPostdoctoral Fellow, Indian Institute of Science BangaloreEmail verificata su iisc.ac.in
- Nate VeldtTexas A&M UniversityEmail verificata su tamu.edu
- Nicolas BOUSQUETEDFEmail verificata su edf.fr