Get my own profile
Public access
View all21 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Timothy J NormanProfessor of Computer Science, University of SouthamptonVerified email at soton.ac.uk
Michael LuckDepartment of Informatics, King's College LondonVerified email at kcl.ac.uk
Federico CeruttiUniversity of BresciaVerified email at unibs.it
Simon MilesReader in Computer Science, King's College LondonVerified email at kcl.ac.uk
Felipe MeneguzziProfessor of Computing Science, University of AberdeenVerified email at cs.cmu.edu
Sanjay ModgilReader, Department of Informatics, King;s College LondonVerified email at kcl.ac.uk
Alun PreeceCardiff University - Crime & Security Research InstituteVerified email at cardiff.ac.uk
Judith MasthoffUtrecht University and University of AberdeenVerified email at uu.nl
Alice TonioloUniversity of St AndrewsVerified email at st-andrews.ac.uk
Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKVerified email at abdn.ac.uk
Stuart ChalmersNPLVerified email at npl.co.uk
Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
Ramon Fraga PereiraSapienza Universitŕ di RomaVerified email at diag.uniroma1.it
Nora FaciUniversité Lyon 1, FranceVerified email at univ-lyon1.fr
W. T. Luke TeacyUniversity of SouthamtonVerified email at ecs.soton.ac.uk
Katia SycaraProfessor School of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Nick JenningsVice-Chancellor and President, Loughborough UniversityVerified email at lboro.ac.uk
Hengfei LiLecturer, Shandong Jianzhu University, ChinaVerified email at sdjzu.edu.cn
Matthias ThimmUniversity of HagenVerified email at fernuni-hagen.de
Simon G. ThompsonGFT TechnologyVerified email at gft.com