Get my own profile
Public access
View all49 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Ewa DeelmanUniversity of Southern California, Information Sciences InstituteVerified email at isi.edu
Jarek NabrzyskiUniversity of Notre DameVerified email at nd.edu
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Ian KelleyResearcher, Information School, University of WashingtonVerified email at uw.edu
Vlado StankovskiFull Professor, University of LjubljanaVerified email at fri.uni-lj.si
Zhiming ZhaoAssociate professor - University of AmsterdamVerified email at uva.nl
Dennis GannonProfessor, Indiana UniversityVerified email at indiana.edu
Omer RanaCardiff University, UKVerified email at cardiff.ac.uk
Graham BentNeurosynapse LtdVerified email at uk.ibm.com
Bertram LudäscherProfessor, School of Information Sciences, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Joseph MackerSenior Network Scientist, Naval Research LaboratoryVerified email at nrl.navy.mil
Tom GoodaleLiverpool John Moores UniversityVerified email at ljmu.ac.uk
David M RogersSchool of Computer Science and Informatics, Cardiff UniversityVerified email at cs.cardiff.ac.uk
Thilo KielmannAssociate Professor of Computer Science, Vrije Universiteit, AmsterdamVerified email at vu.nl
Kacsuk PéterProfessor of Distributed Computing, SZTAKI and Univ.of WestminsterVerified email at sztaki.hu
Carlo MastroianniDirector of Research at ICAR-CNRVerified email at icar.cnr.it
Matthew B. JonesUniversity of California Santa BarbaraVerified email at nceas.ucsb.edu
George SuciuUniversity "Politehnica" of Bucharest & BEIA ConsultVerified email at beia.ro
Matthew J. TurkUniversity of IllinoisVerified email at illinois.edu
Adam BrinckmanSenior Research Programmer, University of Notre DameVerified email at nd.edu