Crea il mio profilo
Accesso pubblico
Visualizza tutto19 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Stuart M AllenSchool of Computer Science & Informatics, Cardiff UniversityEmail verificata su cardiff.ac.uk
- Diane FelmleeProfessor of Sociology, Pennsylvania UniversityEmail verificata su psu.edu
- Don TowsleyUniversity of MassachusettsEmail verificata su cs.umass.edu
- Kun TuMetaEmail verificata su fb.com
- Beryl NoëLecturer, Cardiff University, UKEmail verificata su cardiff.ac.uk
- Jian LiAssistant Professor, Stony Brook UniversityEmail verificata su stonybrook.edu
- David E LindenMaastricht UniversityEmail verificata su maastrichtuniversity.nl
- Dave BrainesIBM Research, UKEmail verificata su uk.ibm.com
- Gualtiero (Walter) ColomboCardiff UniversityEmail verificata su cs.cf.ac.uk
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteEmail verificata su cardiff.ac.uk
- B WinkensAssociate Professor, Maastricht UniversityEmail verificata su maastrichtuniversity.nl
- David G. RandErwin H. Schell Professor, MIT SloanEmail verificata su mit.edu
- Leandros TassiulasProfessor of Electrical Engineering, Yale UniversityEmail verificata su yale.edu
- Geeth de MelResearch Staff MemberEmail verificata su uk.ibm.com
- Dinesh VermaIBMEmail verificata su us.ibm.com
- Björn FriedrichsSchool of Computer Science & Informatics, Cardiff UniversityEmail verificata su cardiff.ac.uk
- Luis Espinosa AnkeCardiff UniversityEmail verificata su cardiff.ac.uk
- Gregory R MaioProfessor of Psychology, University of BathEmail verificata su bath.ac.uk
- R K E BellamyIBM ResearchEmail verificata su us.ibm.com
- Yarrow DunhamDepartment of Psychology, Yale UniversityEmail verificata su yale.edu
Segui
Liam D Turner
School of Computer Science & Informatics, Cardiff University
Email verificata su cardiff.ac.uk