Get my own profile
Public access
View all42 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Guenther RuheProfessor of Computer Science, Electrical and Software Engineering, University of CalgaryVerified email at ucalgary.ca
Dietmar PfahlUniversity of Tartu, EstoniaVerified email at ut.ee
Walid MaalejUniversity of HamburgVerified email at informatik.uni-hamburg.de
Bram AdamsQueen's UniversityVerified email at queensu.ca
Henry ChoEngineering Science, University of TorontoVerified email at mail.utoronto.ca
Thomas ZimmermannSr. Principal Researcher at Microsoft Research, RedmondVerified email at microsoft.com
Timo JohannDigital Transformation Manager at Es-geht-Energiesysteme GmbHVerified email at informatik.uni-hamburg.de
Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityVerified email at cispa.de
Jane Huffman HayesUniversity of KentuckyVerified email at cs.uky.edu
Frank MaurerUniversity of CalgaryVerified email at ucalgary.ca
mahshid marboutiUniversity Of Calgary, Calgary, AlbertaVerified email at ucalgary.ca
Rick KazmanProfessor, University of HawaiiVerified email at hawaii.edu
Kelly LyonsFaculty of Information, University of TorontoVerified email at utoronto.ca
Alex DekhtyarProfessor, Department of Computer Science, Cal PolyVerified email at calpoly.edu
Christof EbertVectorVerified email at ieee.org
Giuliano (Giulio) AntoniolRetired -- Former Professor at DGIGL -- Polytechnique MontréalVerified email at polymtl.ca
Yuanfang CaiProfessor of Computer Science, Drexel UniversityVerified email at cs.drexel.edu
Alessio FerrariResearch Scientist, ISTI CNRVerified email at isti.cnr.it
Muhammad Rezaul Karim, PhDUniversity of CalgaryVerified email at alumni.ucalgary.ca
Paul ChenSoftware Engineering, University of CalgaryVerified email at ucalgary.ca