Get my own profile
Public access
View all49 articles
9 articles
available
not available
Based on funding mandates
Co-authors
- Matthew S ShieldsVerified email at simbachain.com
- Ewa DeelmanUniversity of Southern California, Information Sciences InstituteVerified email at isi.edu
- Jarek NabrzyskiUniversity of Notre DameVerified email at nd.edu
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
- Ian KelleyResearcher, Information School, University of WashingtonVerified email at uw.edu
- Vlado StankovskiFull Professor, University of LjubljanaVerified email at fri.uni-lj.si
- Zhiming ZhaoAssociate professor - University of AmsterdamVerified email at uva.nl
- Dennis GannonProfessor, Indiana UniversityVerified email at indiana.edu
- Graham BentNeurosynapse LtdVerified email at uk.ibm.com
- Omer RanaCardiff University, UKVerified email at cardiff.ac.uk
- Bertram LudäscherProfessor, School of Information Sciences, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Joseph MackerSenior Network Scientist, Naval Research LaboratoryVerified email at nrl.navy.mil
- Tom GoodaleLiverpool John Moores UniversityVerified email at ljmu.ac.uk
- David M RogersSchool of Computer Science and Informatics, Cardiff UniversityVerified email at cs.cardiff.ac.uk
- Thilo KielmannAssociate Professor of Computer Science, Vrije Universiteit, AmsterdamVerified email at vu.nl
- Matthew B. JonesUniversity of California Santa BarbaraVerified email at nceas.ucsb.edu
- Kacsuk PéterProfessor of Distributed Computing, SZTAKI and Univ.of WestminsterVerified email at sztaki.hu
- Carlo MastroianniDirector of Research at ICAR-CNRVerified email at icar.cnr.it
- George SuciuUniversity "Politehnica" of Bucharest & BEIA ConsultVerified email at beia.ro
- Matthew J. TurkUniversity of IllinoisVerified email at illinois.edu