Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
Enric PlazaIIIA-CSICVerified email at iiia.csic.es
Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKVerified email at abdn.ac.uk
Thomas La PortaPenn State UniversityVerified email at cse.psu.edu
Gavin PearsonDstlVerified email at dstl.gov.uk
Amotz Bar-NoyProfessor of Computer Science, City University of New York (CUNY)Verified email at sci.brooklyn.cuny.edu
Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
Hosam RowaihyAssistant Professor of Computer Engineering, King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
Matthew P. JohnsonDepartment of CS, Lehman College, CUNYVerified email at ucla.edu
Clara Benac EarleUniversidad Politécnica de MadridVerified email at fi.upm.es
Derek SleemanProfessor of Computing Science, The University, Aberdeen, UKVerified email at abdn.ac.uk
Jordi Sabater-MirTenured Scientist, IIIA-CSICVerified email at iiia.csic.es
Maite Lopez-SanchezFull professor of Artificial Intelligence, Universitat de BarcelonaVerified email at ub.edu
Ramon Lopez de MantarasResearch Professor, Artificial Intelligence Research Institute, IIIA-CSIC, BarcelonaVerified email at iiia.csic.es
Chris van AartResearcher at VU University AmsterdamVerified email at vanaart.com
José-Manuel López-CoboOlympic Channel ServicesVerified email at olympicchannel.com
Nir OrenProfessor at the University of AberdeenVerified email at abdn.ac.uk
Rosa BanosUniversidad de ValenciaVerified email at uv.es