Get my own profile
Public access
View all67 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityVerified email at mq.edu.au
- Thilina RanbadugeAustralian National University and Data 61, CSIROVerified email at anu.edu.au
- Charith PereraCardiff University, UKVerified email at acm.org
- Arkady ZaslavskyDeakin University, Data61 @ CSIRO, Monash University, Lulea University of Technology(Sweden)Verified email at deakin.edu.au
- Dimitrios GeorgakopoulosSwinburne University of TechnologyVerified email at swin.edu.au
- Tim ChurchesUNSW Australia, Faculty of MedicineVerified email at unsw.edu.au
- Rainer SchnellUniversität Duisburg-EssenVerified email at uni-due.de
- Vassilios VerykiosHellenic Open University, GREECEVerified email at eap.gr
- Markus HeglandThe Australian National UniversityVerified email at anu.edu.au
- Erhard RahmProfessor of Computer Science, Leipzig University, Founding director national AI center ScaDS.AIVerified email at informatik.uni-leipzig.de
- Qing WangSchool of Computing, Australian National UniversityVerified email at anu.edu.au
- Ross W GaylerIndependent ResearcherVerified email at rossgayler.com
- Graham WilliamsAustralian National UniversityVerified email at togaware.com
- Stephen G RobertsMathematics, Australian National UniversityVerified email at anu.edu.au
- Khoi-Nguyen TranResearch Software Engineer, IBM Research - AlmadenVerified email at ibm.com
- Nishadi KiriellePhD StudentVerified email at anu.edu.au
- David HandImperial College LondonVerified email at imperial.ac.uk
- Anushka VidanageResearch Fellow, Software Innovation Institute, The Australian National UniversityVerified email at anu.edu.au
- Michael ComptonCSIROVerified email at csiro.au
- Prem Prakash JayaramanSwinburne University of TechnologyVerified email at swinburne.edu.au
Follow
Peter Christen
Professor, Australian National University, and University of Edinburgh
Verified email at anu.edu.au - Homepage