Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
9 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yacine OuzroutDISP Laboratory - Université Lumière Lyon 2Email verificata su univ-lyon2.fr
- Sebti Foufou, PhDProf. of Computer Science, University of Sharjah, UAEEmail verificata su sharjah.ac.ae
- Abdelhak BelhiCSE, College of Engineering, Doha, QatarEmail verificata su qu.edu.qa
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityEmail verificata su rmit.edu.au
- haiqing zhangChengdu University of Information TechnologyEmail verificata su cuit.edu.cn
- Houssem GasmiUniversity of QatarEmail verificata su univ-lyon2.fr
- Ridha DerrouicheProfessor of Supply Chain, EM Strasbourg Business School, Strasbourg UniversityEmail verificata su em-strasbourg.eu
- Dimitris KiritsisEPFLEmail verificata su epfl.ch
- Pradorn SUREEPHONGCollege of Arts, Media and Technology, Chiang Mai UniversityEmail verificata su camt.info
- Chantal Cherifi BonnerComputer Science, Associate Professor, DISP Lab. University of Lyon2, FRANCEEmail verificata su univ-lyon2.fr
- Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesEmail verificata su rmit.edu.au
- Sergio TerziPolitecnico di MilanoEmail verificata su polimi.it
- Sudarsan RachuriAdvanced Manufacturing Office, EERE,DOEEmail verificata su hq.doe.gov
- Eswaran SubrahmanianCarnegie Mellon UniversityEmail verificata su cmu.edu
- Nickolas S. SapidisDepartment of Mechanical Engineering, University of Western MacedoniaEmail verificata su uowm.gr