Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jin-Hee ChoComputer Science Department, Virginia TechEmail verificata su vt.edu
- Charles KamhouaDEVCOM Army Research Laboratory, Network Security BranchEmail verificata su army.mil
- Ahmed H. Anwar, (Ahmed Hemida)Research Scientist, DEVCOM ARLEmail verificata su knights.ucf.edu
- Mu ZhuNorth Carolina State UniversityEmail verificata su ncsu.edu
- Munindar P SinghProfessor of Computer Science, North Carolina State UniversityEmail verificata su ncsu.edu
- Terrence J MooreUS Army Research LaboratoryEmail verificata su army.mil
- Yash MahajanOracleEmail verificata su vt.edu
- Beom Woo KangHanyang UniversityEmail verificata su hanyang.ac.kr
- Xujiang ZhaoResearcher at NEC Laboratories AmericaEmail verificata su nec-labs.com
- Zhen GuoPhD, CS@ Virginia TechEmail verificata su vt.edu
- Feng ChenDepartment of Computer Science, UT DallasEmail verificata su utdallas.edu
- Abdullah Zubair MohammedPh.D. student, Virginia TechEmail verificata su vt.edu