Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Henri BalVU University AmsterdamVerified email at cs.vu.nl
Henk SipsEm. Professor of Computer Science, Delft University of TechnologyVerified email at tudelft.nl
Johan PouwelseAssociate Professor of Computer Science, Delft University of TechnologyVerified email at tudelft.nl
Marco ZunigaDelft University of TechnologyVerified email at tudelft.nl
R. (Inald) L. LagendijkUniversity Professor of Computing-based Society, Computer Science, Delft University of TechnologyVerified email at tudelft.nl
Rutger HofmanResearch programmer, VU University AmsterdamVerified email at cs.vu.nl
Niels Brouwers PhDDelft University of TechnologyVerified email at tudelft.nl
Kay RömerProfessor, TU GrazVerified email at tugraz.at
Matthias WoehrleCorporate Research, Robert Bosch GmbHVerified email at tik.ee.ethz.ch
Frans KaashoekMassuchesetts Institute of Technology (MIT)Verified email at mit.edu
Otto VisserResearcher at Delft University of TechnologyVerified email at tudelft.nl
Peter CorkeQueensland University of Technology (QUT)Verified email at qut.edu.au
Andreas LoukasEPFLVerified email at epfl.ch
Stefan DulmanResearcher, CWI AmsterdamVerified email at cwi.nl
Marco CattaniARMVerified email at tudelft.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Muneeb AliPrinceton UniversityVerified email at princeton.edu
Willem (Wim) G. VreeProfessor of Information and Communication Technology, Delft University of TechnologyVerified email at tudelft.nl
Brano KusyAutonomous Systems, CSIRO, AustraliaVerified email at csiro.au
Kees VerstoepScientific ProgrammerVerified email at cs.vu.nl
Koen Langendoen
Verified email at tudelft.nl - Homepage