Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Clay WilliamsGreenphireEmail verificata su greenphire.com
- Giuseppe ValettoFondazione Bruno KesslerEmail verificata su cs.columbia.edu
- Kaan KatirciogluMicrosoftEmail verificata su microsoft.com
- Emanuel MelachrinoudisNortheastern UniversityEmail verificata su coe.neu.edu
- David GamarnikProfessor of Operations Research, MITEmail verificata su mit.edu
- Thomas Ericksonretired@MinneapolisEmail verificata su acm.org
- Catalina DanisResearch Staff Member, IBM TJ Watson Research CenterEmail verificata su us.ibm.com
- Wendy A. KelloggIBM T.J. Watson Research CenterEmail verificata su us.ibm.com
- Saharon RossetTel Aviv UniversityEmail verificata su post.tau.ac.il
- Chandan K. ReddyProfessor, Computer Science, Virginia TechEmail verificata su cs.vt.edu
- Ching-Yung LinIBM Chief Scientist, Graph ComputingEmail verificata su us.ibm.com
- Paolina CentonzeProfessor of Computer Science, Managing Director of Cybersecurity, Iona University, New RochelleEmail verificata su iona.edu
- Yan LiuProfessor, Director of Machine Learning Center@USCEmail verificata su usc.edu
- Annie YingPhD Candidate, McGill UniversityEmail verificata su cs.mcgill.ca
- Ramesh NatarajanResearch Professor, Yeshiva University, NYEmail verificata su yu.edu
- Janusz MareckiDeepMindEmail verificata su google.com
- laura wynterIBM Watson Research CenterEmail verificata su us.ibm.com
- Léa Amandine DelerisHead of RISK Artificial Intelligence Research, BNP ParibasEmail verificata su bnpparibas.com
- José SantiváñezUTEC - Universidad de Ingeniería y TecnologíaEmail verificata su utec.edu.pe
- Gautam BasuAalto UniversityEmail verificata su aalto.fi