Get my own profile
Public access
View all18 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Timothy NormanProfessor of Computer Science, University of SouthamptonVerified email at soton.ac.uk
Michael LuckDepartment of Informatics, King's College LondonVerified email at kcl.ac.uk
Federico CeruttiUniversity of BresciaVerified email at unibs.it
Felipe MeneguzziProfessor of Computer Science, Pontifícia Universidade Católica do Rio Grande do SulVerified email at cs.cmu.edu
Simon MilesReader in Computer Science, King's College LondonVerified email at kcl.ac.uk
Sanjay ModgilReader, Department of Informatics, King;s College LondonVerified email at kcl.ac.uk
Alun PreeceCardiff University - Crime & Security Research InstituteVerified email at cardiff.ac.uk
Alice TonioloUniversity of St AndrewsVerified email at st-andrews.ac.uk
Judith MasthoffUtrecht University and University of AberdeenVerified email at uu.nl
Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKVerified email at abdn.ac.uk
Stuart ChalmersNPLVerified email at npl.co.uk
Nora FaciUniversité Lyon 1, FranceVerified email at univ-lyon1.fr
W. T. Luke TeacyUniversity of SouthamtonVerified email at ecs.soton.ac.uk
Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
Katia SycaraProfessor School of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Nick JenningsVice-Provost (Research and Enterprise), Imperial CollegeVerified email at imperial.ac.uk
Simon G. ThompsonGFT TechnologyVerified email at gft.com
Matthias ThimmUniversität Koblenz-LandauVerified email at uni-koblenz.de
Yuqing TangFacebook AIVerified email at fb.com
Chris BurnettUniversity of AberdeenVerified email at abdn.ac.uk
Nir Oren
Verified email at abdn.ac.uk - Homepage