Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Tilman WolfProfessor of Electrical and Computer Engineering, University of Massachusetts AmherstEmail verificata su umass.edu
- Sriram NatarajanGoogle Inc.Email verificata su google.com
- Srini SeetharamanVMwareEmail verificata su vmware.com
- Deepak UnnikrishnanNVIDIA, University of Massachusetts, AmherstEmail verificata su ecs.umass.edu
- Lixin GaoDistinguished Professor, Univ. of MassachusettsEmail verificata su ecs.umass.edu
- Ramakrishna VadlamaniQualcomm Technologies IncEmail verificata su qti.qualcomm.com
- Russell TessierUniversity of MassachusettsEmail verificata su umass.edu
- Y. Sinan HanayASML and Luxoft (DXC)Email verificata su asml.com
- Shachi H. KumarResearch Scientist, Intel LabsEmail verificata su intel.com
- Xinming ChenUniversity of Massachusetts AmherstEmail verificata su google.com
- Hao CaiByteDance Ltd.Email verificata su bytedance.com
- Jeremy Buhlerprofessor of computer science, Washington universityEmail verificata su wustl.edu
- Anthony M CabreraResearch Scientist, Oak Ridge National LaboratoryEmail verificata su ornl.gov
- Roger ChamberlainProfessor of Computer Science and Engineering, Washington UniversityEmail verificata su wustl.edu
- Clayton FaberPhD Student, Washington UniversityEmail verificata su wustl.edu
- Kekai HuPrincipal Security Researcher, IntelEmail verificata su intel.com
- Shlomo ZilbersteinProfessor of Computer Science, University of Massachusetts AmherstEmail verificata su cs.umass.edu
- Richard G. FreedmanPh.D. Student, University of Massachusetts AmherstEmail verificata su cs.umass.edu
- Harumi Kunoprinciple research engineer, Hewlett Packard LabsEmail verificata su hpe.com
- Sharad SinghalHewlett Packard EnterpriseEmail verificata su hpe.com