Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Biagio PeccerilloDepartment of Information Engineering and Mathematics, University of SienaVerified email at diism.unisi.it
- Antoni PorteroResearch Scientist, Forschungszentrum Jülich, GermanyVerified email at uab.cat
- Alberto SciontiPh.D, LINKS FoundationVerified email at linksfoundation.com
- Mirco ManninoPhD student, University of SienaVerified email at diism.unisi.it
- Paolo FaraboschiHewlett Packard LabsVerified email at faraboschi.com
- Seznec AndreINRIA/IRISAVerified email at inria.fr
- Elham CheshmikhaniShahid Beheshti UniversityVerified email at sbu.ac.ir
- Peter Yuen Ho HinUndergraduate Student, Nanyang Technological UniversityVerified email at e.ntu.edu.sg
- Yan SolihinCharles N. Millican Chair Professor of Computer Science at UCF, Director for Cybersecurity andVerified email at ucf.edu
- Jason Lowe-PowerAssociate Professor, University of California, DavisVerified email at ucdavis.edu
- Matteo AndreozziarmVerified email at arm.com