Crea il mio profilo
Accesso pubblico
Visualizza tutto21 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Trinh Viet DoanTechnical University of MunichEmail verificata su in.tum.de
- Jürgen SchönwälderConstructor UniversityEmail verificata su constructor.university
- Mike KosekTechnical University of MunichEmail verificata su in.tum.de
- Tanya ShreedharPostdoctoral Researcher-TU DelftEmail verificata su ed.ac.uk
- kc claffyCenter for Applied Internet Data Analysis at the University of California, San DiegoEmail verificata su caida.org
- Ricky K. P. MokCAIDA/UCSDEmail verificata su caida.org
- Oliver HohlfeldUniversity of KasselEmail verificata su ohohlfeld.com
- Jayasree SenguptaAssistant Professor, BIT MesraEmail verificata su bitmesra.ac.in
- Justus FriesTechnical University of MunichEmail verificata su tum.de
- Marco MelliaPolitecnico di Torino, italyEmail verificata su polito.it
- Henning SchulzrinneProfessor of Computer Science, Columbia UniversityEmail verificata su cs.columbia.edu
- Simone FerlinSenior performance engineer, senior adjunct lecturerEmail verificata su ferlin.io
- David ClarkSenior Research Scientist, Computer Science and AI Lab, MITEmail verificata su csail.mit.edu
- Alex C. SnoerenUC San DiegoEmail verificata su cs.ucsd.edu
- Robin MARXAkamaiEmail verificata su akamai.com
- Anja FeldmannDirektor, Max Planck Institut für Informatik, Saarland Informatics Campus, Saarland UniversityEmail verificata su mpi-inf.mpg.de
- Georgios SmaragdakisProfessor of Computer Science, Delft University of Technology (TU Delft)Email verificata su tudelft.nl
- Jon CrowcroftUniversity of CambridgeEmail verificata su cl.cam.ac.uk
- Srinivasan KeshavProfessor of Computer Science, University of CambridgeEmail verificata su cam.ac.uk
- Roland van Rijswijk-DeijProfessor of Network Security, University of TwenteEmail verificata su utwente.nl