Get my own profile
Public access
View all20 articles
19 articles
available
not available
Based on funding mandates
Co-authors
- Lin ChenDepartment of computer science, Zhejiang UniversityVerified email at zju.edu.cn
- Xin Handalian university of technologyVerified email at dlut.edu.cn
- Xiaoqiang CaiThe Chinese Unversity of Hong KongVerified email at se.cuhk.edu.hk
- Klaus JansenProfessor, Computer Science, University of KielVerified email at informatik.uni-kiel.de
- Denis TrystramProfessor of Computer Science, Grenoble Institute of Technology, FranceVerified email at imag.fr
- Francis ChinThe University of Hong KongVerified email at cs.hku.hk
- Erwin PeschUniversity of SiegenVerified email at uni-siegen.de
- Jacek BlazewiczProfesor informatyki, Politechnika PoznanskaVerified email at cs.put.poznan.pl
- Chung-Yee LeeHong Kong University of Science & TechnologyVerified email at ust.hk
- Nikhil BansalUniversity of MichiganVerified email at umich.edu
- Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Gerhard WoegingerProfessor of Computer Science, RWTH AachenVerified email at cs.rwth-aachen.de
- Jiri SgallComputer Science Institute of Charles UniversityVerified email at iuuk.mff.cuni.cz
- Danny Z ChenProfessor of Computer Science & Engineering, University of Notre DameVerified email at nd.edu
- Rainer E. BurkardProfessor emer. of Mathematics, TU GrazVerified email at opt.math.tu-graz.ac.at
- Michael A. BenderStony Brook UniversityVerified email at cs.stonybrook.edu
- Veronika Rehn-SonigoUniversité de Franche-Comté / FEMTO-STVerified email at femto-st.fr
- Cynthia PhillipsLaboratory Fellow, Sandia National Laboratories, Albuquerque, NMVerified email at sandia.gov