Get my own profile
Public access
View all49 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Matthew S ShieldsVerified email at simbachain.com
Ewa DeelmanUniversity of Southern California, Information Sciences InstituteVerified email at isi.edu
Jarek NabrzyskiUniversity of Notre DameVerified email at nd.edu
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Vlado StankovskiFull Professor, University of LjubljanaVerified email at fri.uni-lj.si
Zhiming ZhaoAssociate professor - University of AmsterdamVerified email at uva.nl
Ian KelleyResearcher, Information School, University of WashingtonVerified email at uw.edu
Dennis GannonProfessor, Indiana UniversityVerified email at indiana.edu
Graham BentNeurosynapse LtdVerified email at uk.ibm.com
Omer RanaCardiff University, UKVerified email at cardiff.ac.uk
Bertram LudäscherProfessor, School of Information Sciences, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Joseph MackerSenior Network Scientist, Naval Research LaboratoryVerified email at nrl.navy.mil
Tom GoodaleLiverpool John Moores UniversityVerified email at ljmu.ac.uk
David M RogersSchool of Computer Science and Informatics, Cardiff UniversityVerified email at cs.cardiff.ac.uk
Thilo KielmannAssociate Professor of Computer Science, Vrije Universiteit, AmsterdamVerified email at vu.nl
Matthew B. JonesUniversity of California Santa BarbaraVerified email at nceas.ucsb.edu
Kacsuk PéterProfessor of Distributed Computing, SZTAKI and Univ.of WestminsterVerified email at sztaki.hu
Carlo MastroianniDirector of Research at ICAR-CNRVerified email at icar.cnr.it
George SuciuUniversity "Politehnica" of Bucharest & BEIA ConsultVerified email at beia.ro
Matthew J. TurkUniversity of IllinoisVerified email at illinois.edu