Crea il mio profilo
Accesso pubblico
Visualizza tutto15 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Alessio GuglielmiUniversity of BathEmail verificata su Bath.Ac.UK
- Matteo AcclavioUniversity of SussexEmail verificata su sussex.ac.uk
- Sonia MarinLecturer, University of BirminghamEmail verificata su bham.ac.uk
- Willem HeijltjesUniversity of BathEmail verificata su bath.ac.uk
- Kaustuv ChaudhuriINRIAEmail verificata su chaudhuri.info
- Roman KuznetsInstitute of Computer Engineering, Technische Universität WienEmail verificata su logic.at
- Dominic J. D. HughesEmail verificata su theory.stanford.edu
- Anupam DasUniversity of BirminghamEmail verificata su bham.ac.uk
- Ross HorneUniversity of StrathclydeEmail verificata su strath.ac.uk
- Marianna GirlandoILLC, University of AmsterdamEmail verificata su uva.nl
- Agata CiabattoniVienna University of TechnologyEmail verificata su logic.at
- Prakash PanangadenProfessor of Computer Science, McGill UniversityEmail verificata su cs.mcgill.ca
- Davide CattaUniversità di Napoli, Federico IIEmail verificata su telecom-paris.fr
- Tom GundersenEmail verificata su jklm.no
- Ryuta ArisakaKyoto UniversityEmail verificata su kyoto-u.ac.jp
- Kai BrünnlerProfessor of Computer Science, Bern University of Applied SciencesEmail verificata su bfh.ch
- Novak NovakovicMicrosoftEmail verificata su mi.sanu.ac.rs
- Andrea Aler TubellaSenior Research Engineer, Umeå UniversityEmail verificata su umu.se
- Benjamin RalphLecturer in Computer Science, University of BathEmail verificata su bath.ac.uk
- Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgEmail verificata su uni.lu