Crea il mio profilo
Accesso pubblico
Visualizza tutto28 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mikkel AbrahamsenAssociate Professor of Computer Science, University of CopenhagenEmail verificata su di.ku.dk
- Édouard BonnetENS Lyon, LIP, FranceEmail verificata su ens-lyon.fr
- Linda KleistTU BraunschweigEmail verificata su ibr.cs.tu-bs.de
- Paweł RzążewskiWarsaw University of Technology, Faculty of Mathematics and Information ScienceEmail verificata su mini.pw.edu.pl
- Anna AdamaszekPostdoc, University of CopenhagenEmail verificata su di.ku.dk
- Ivor van der HoogTechnical University of DenmarkEmail verificata su dtu.dk
- Dániel MarxCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Jeff EricksonProfessor of Computer Science, University of Illinois, Urbana-ChampaignEmail verificata su illinois.edu
- Andrei AsinowskiUniversity of Klagenfurt, AustriaEmail verificata su aau.at
- Simon WeberPhD student at ETH ZurichEmail verificata su inf.ethz.ch
- Anna LubiwProfessor, David R. Cheriton School of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Debajyoti MondalAssociate Professor of Computer Science, University of Saskatchewan, CanadaEmail verificata su cs.usask.ca
- Daniel BertschingerPhD candidate at ETH ZürichEmail verificata su inf.ethz.ch
- Yoshio OkamotoUniversity of Electro-CommunicationsEmail verificata su uec.ac.jp
- Takeaki UnoNational Institute of Informatics, JapanEmail verificata su nii.jp
- Antonis ThomasPhD Student, ETH ZürichEmail verificata su inf.ethz.ch
- Stefan FelsnerProfessor für Diskrete Mathematik, TU BerlinEmail verificata su math.tu-berlin.de
- Michael HoffmannETH ZürichEmail verificata su inf.ethz.ch
- Paul JungeblutKarlsruhe Institute of TechnologyEmail verificata su kit.edu
- Oswin AichholzerProf. Informatik, TU Graz, Graz, AustriaEmail verificata su ist.tugraz.at