Crea il mio profilo
Accesso pubblico
Visualizza tutto20 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Radu CurticapeanIT University of CopenhagenEmail verificata su itu.dk
- Dániel MarxCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Jesper NederlofUtrecht UniversityEmail verificata su uu.nl
- Thore HusfeldtIT University of CopenhagenEmail verificata su itu.dk
- John LapinskasLecturer in Computer Science, University of BristolEmail verificata su bristol.ac.uk
- Markus BläserSaarland University, Saarland Informatics Campus, Saarbrücken, GermanyEmail verificata su cs.uni-saarland.de
- Christian KomusiewiczFriedrich-Schiller-Universität JenaEmail verificata su uni-jena.de
- Marc RothSchool of Electronic Engineering and Computer Science, Queen Mary University of LondonEmail verificata su qmul.ac.uk
- Martin GroheProfessor of Computer Science, RWTH Aachen UniversityEmail verificata su informatik.rwth-aachen.de
- Marek CyganUniversity of WarsawEmail verificata su mimuw.edu.pl
- Yoshio OkamotoUniversity of Electro-CommunicationsEmail verificata su uec.ac.jp
- Daniel LokshtanovProfessor of Computer Science, UCSBEmail verificata su ucsb.edu
- Magnus WahlströmRoyal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Saket SaurabhProfessor at Institute of Mathematical SciencesEmail verificata su imsc.res.in
- Kitty MeeksUniversity of GlasgowEmail verificata su glasgow.ac.uk
- Fedor V. FominProfessor of Computer Science, University of BergenEmail verificata su uib.no
- Cornelius BrandRegensburg UniversityEmail verificata su informatik.uni-regensburg.de
- Amir AbboudWeizmann Institute of ScienceEmail verificata su weizmann.ac.il
- Karl BringmannProfessor in Computer Science, Saarland UniversityEmail verificata su cs.uni-saarland.de
- Nimrod TalmonBen-Gurion UniversityEmail verificata su bgu.ac.il