Get my own profile
Public access
View all0 articles
10 articles
available
not available
Based on funding mandates
Co-authors
- Kento AidaNational Institute of InformaticsVerified email at nii.ac.jp
- Ichiro SatohNational Institute of InformaticsVerified email at nii.ac.jp
- Kimitoshi TakahashiCluster Computing Inc.Verified email at ccmp.jp
- Atsuko TakefusaNational Institute of InformaticsVerified email at nii.ac.jp
- Sisi DuanResearch Scientist, PhD Advisor, Tsinghua UniversityVerified email at mail.tsinghua.edu.cn
- Markus UllrichResearch Associate; University of Applied Sciences Zittau/GörlitzVerified email at hszg.de
- Martin GaedkeChemnitz University of TechnologyVerified email at informatik.tu-chemnitz.de
- Cheng YangShanghai University of Electric PowerVerified email at shiep.edu.cn
- Giancarlo FortinoFull Prof. of Computer Engineering, University of Calabria, FIEEE, FAAIA, Highly Cited ResearcherVerified email at unical.it
- Jason J. JungChung-Ang UniversityVerified email at cau.ac.kr
- Antonio GuerrieriItalian National Research Council - ICAR-CNR, Università della CalabriaVerified email at icar.cnr.it
- Yuan Yuan (袁圆)Guangdong Polytechnic Normal UniversityVerified email at szu.edu.cn
- Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisVerified email at lbl.gov
- Jerry CaoSingapore Management UniversityVerified email at smu.edu.sg