Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Henk SipsEm. Professor of Computer Science, Delft University of TechnologyVerified email at tudelft.nl
Henri BalVU University AmsterdamVerified email at cs.vu.nl
R. (Inald) L. LagendijkUniversity Professor of Computing-based Society, Computer Science, Delft University of TechnologyVerified email at tudelft.nl
Johan PouwelseAssociate Professor of Computer Science, Delft University of TechnologyVerified email at tudelft.nl
Marco ZunigaDelft University of TechnologyVerified email at tudelft.nl
Rutger HofmanResearch programmer, VU University AmsterdamVerified email at cs.vu.nl
Niels Brouwers PhDDelft University of TechnologyVerified email at tudelft.nl
Kay RömerProfessor, TU GrazVerified email at tugraz.at
Matthias WoehrleCorporate Research, Robert Bosch GmbHVerified email at tik.ee.ethz.ch
Frans KaashoekMassuchesetts Institute of Technology (MIT)Verified email at mit.edu
Otto VisserResearcher at Delft University of TechnologyVerified email at tudelft.nl
Peter CorkeQueensland University of Technology (QUT)Verified email at qut.edu.au
Andreas LoukasPrincipal Scientist at Prescient Design, Genentech / Roche, ex: EPFL, TU DelftVerified email at roche.com
Stefan DulmanResearcher, CWI AmsterdamVerified email at cwi.nl
Marco CattaniARMVerified email at arm.com
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Muneeb AliPrinceton UniversityVerified email at princeton.edu
Brano KusyAutonomous Systems, CSIRO, AustraliaVerified email at csiro.au
Willem (Wim) G. VreeProfessor of Information and Communication Technology, Delft University of TechnologyVerified email at tudelft.nl
Kees VerstoepScientific ProgrammerVerified email at cs.vu.nl