Get my own profile
Public access
View all37 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Mauro VallatiFull Professor, University of HuddersfieldVerified email at hud.ac.uk
T.L. McCluskeyProfessor of Software Technology, University of HuddersfieldVerified email at hud.ac.uk
Falilat JimohNational Information Technology Development AgencyVerified email at nitda.gov.ng
Wolfgang FaberAlpen-Adria-Universität KlagenfurtVerified email at aau.at
Simon ParkinsonProfessor, University of Huddersfield & UK Government Cyber Security Advisory Board MemberVerified email at hud.ac.uk
Dr Mohammad ShahUniversity of WestminsterVerified email at westminster.ac.uk
Michael MorakUniversity of KlagenfurtVerified email at aau.at
Tomas BalyoFiluta AIVerified email at filuta.ai
Daniele MagazzeniJ.P. Morgan. Chief Analytics Officer for the Commercial and Investment BankVerified email at jpmorgan.com
Pavel RytířPostdoc in Computer Science, The City University of New YorkVerified email at ccny.cuny.edu
Mark "mak" RobertsThe US Naval Research LaboratoryVerified email at nrl.navy.mil
Martin PilátAssistant Professor, Faculty of Mathematics and Physics, Charles UniversityVerified email at mff.cuni.cz
Peter GregorySenior Research Scientist, Schlumberger Cambridge ResearchVerified email at tees.ac.uk
Isabel CenamorXplain A. G.Verified email at alumnos.uc3m.es
Frank HutterELLIS Institute & Professor, University of Freiburg, GermanyVerified email at cs.uni-freiburg.de
Rostislav HorčíkDepartment of Computer Science, FEE, Czech Technical University in PragueVerified email at fel.cvut.cz
Jakub GemrotLecturer of Game Development, Faculty of Mathematics and Physics, Charles UniversityVerified email at gamedev.cuni.cz
Tiago VaqueroJet Propulsion Laboratory, California Institute of TechnologyVerified email at jpl.nasa.gov
José PintoComputer Science PhD studentVerified email at fe.up.pt
Daniel FišerSaarland UniversityVerified email at danfis.cz