Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Stuart M AllenSchool of Computer Science & Informatics, Cardiff UniversityVerified email at cardiff.ac.uk
- Diane FelmleeProfessor of Sociology, Pennsylvania UniversityVerified email at psu.edu
- Don TowsleyUniversity of MassachusettsVerified email at cs.umass.edu
- Kun TuMetaVerified email at fb.com
- Jian LiAssistant Professor, Stony Brook UniversityVerified email at stonybrook.edu
- David E LindenMaastricht UniversityVerified email at maastrichtuniversity.nl
- Dave BrainesIBM Research, UKVerified email at uk.ibm.com
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
- B WinkensAssociate Professor, Maastricht UniversityVerified email at maastrichtuniversity.nl
- David G. RandErwin H. Schell Professor, MIT SloanVerified email at mit.edu
- Luis Espinosa AnkeCardiff UniversityVerified email at cardiff.ac.uk
- Leandros TassiulasProfessor of Electrical Engineering, Yale UniversityVerified email at yale.edu
- Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
- Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterVerified email at us.ibm.com
- Dinesh VermaIBMVerified email at us.ibm.com
- Gregory R MaioProfessor of Psychology, University of BathVerified email at bath.ac.uk
- R K E BellamyIBM ResearchVerified email at us.ibm.com
- Yarrow DunhamDepartment of Psychology, Yale UniversityVerified email at yale.edu
- Carolina FuentesSchool of Computer Science & Informatics, Cardiff UniversityVerified email at cardiff.ac.uk
- Zara SiddiqueCardiff UniversityVerified email at cardiff.ac.uk
Follow
Liam D Turner
School of Computer Science & Informatics, Cardiff University
Verified email at cardiff.ac.uk