Get my own profile
Public access
View all42 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Ewa DeelmanUniversity of Southern California, Information Sciences InstituteVerified email at isi.edu
Jarek NabrzyskiUniversity of Notre DameVerified email at nd.edu
Ian KelleyResearcher, Information School, University of WashingtonVerified email at uw.edu
Vlado StankovskiFull Professor, University of LjubljanaVerified email at fri.uni-lj.si
Alun PreeceCardiff University - Crime & Security Research InstituteVerified email at cardiff.ac.uk
Zhiming ZhaoUniversity of AmsterdamVerified email at uva.nl
Dennis GannonProfessor, Indiana UniversityVerified email at indiana.edu
Omer RanaCardiff University, UKVerified email at cardiff.ac.uk
Graham BentSTSM IBM UK LtdVerified email at uk.ibm.com
Joseph MackerSenior Network Scientist, Naval Research LaboratoryVerified email at nrl.navy.mil
Tom GoodaleLiverpool John Moores UniversityVerified email at ljmu.ac.uk
Bertram LudäscherProfessor, School of Information Sciences, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Thilo KielmannAssociate Professor of Computer Science, Vrije Universiteit, AmsterdamVerified email at vu.nl
David M RogersSchool of Computer Science and Informatics, Cardiff UniversityVerified email at cs.cardiff.ac.uk
Carlo MastroianniDirector of Research at ICAR-CNRVerified email at icar.cnr.it
Kacsuk PéterProfessor of Distributed Computing, SZTAKI and Univ.of WestminsterVerified email at sztaki.hu
Sandra GesingScientific Outreach and DEI Lead at the University of Illinois Chicago at DPIVerified email at nd.edu
Matthew B. JonesUniversity of California Santa BarbaraVerified email at nceas.ucsb.edu
George SuciuUniversity "Politehnica" of Bucharest & BEIA ConsultVerified email at beia.ro
Matthew J. TurkUniversity of IllinoisVerified email at illinois.edu