Crea il mio profilo
Accesso pubblico
Visualizza tutto15 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Anna ScaglioneProfessor of Electrical and Computer Engineering, Cornell UniversityEmail verificata su cornell.edu
- György DánProfessor, KTH Royal Institute of TechnologyEmail verificata su kth.se
- Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisEmail verificata su lbl.gov
- Emiliano Dall'AneseUniversity of Colorado BoulderEmail verificata su colorado.edu
- Andrey BernsteinPrincipal Researcher and Group Manager, National Renewable Energy Laboratory (NREL)Email verificata su nrel.gov
- Hoi-To WaiAssistant Professor, The Chinese University of Hong KongEmail verificata su se.cuhk.edu.hk
- Mahdi JameiInvenia LabsEmail verificata su invenialabs.co.uk
- Teklemariam TesfayCybersecurity EngineerEmail verificata su jpl.nasa.gov
- Reinhard GentzAmazonEmail verificata su amazon.com
- Andreas SpaniasArizona State UniversityEmail verificata su asu.edu
- Cihan TepedelenliogluArizona State UniversityEmail verificata su asu.edu
- Ezzeldin ShereenPhD Candidate, KTH Royal Institute of Technology, SwedenEmail verificata su kth.se
- Ignacio Losada CarreñoCornell UniversityEmail verificata su cornell.edu
- David PinneyAnalytics Program Manager, NRECAEmail verificata su NRECA.coop
- Daniel ArnoldLawrence Berkeley National LaboratoryEmail verificata su lbl.gov
- Sy Toan NgoLawrence Berkeley National LabEmail verificata su lbl.gov
- Nathan JohnsonEmail verificata su asu.edu
- Nikhil RaviGraduate Research Assistant, Cornell UniversityEmail verificata su cornell.edu
- Neelesh B. MehtaIndian Institute of Science, BangaloreEmail verificata su ece.iisc.ernet.in
- Chandra MurthyProfessor, ECE, Indian Institute of ScienceEmail verificata su iisc.ac.in
Segui
Raksha Ramakrishna
Postdoctoral Researcher, KTH Royal Institute of Technology
Email verificata su kth.se - Home page