Crea il mio profilo
Accesso pubblico
Visualizza tutto21 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sisi DuanResearch Scientist, PhD Advisor, Tsinghua UniversityEmail verificata su mail.tsinghua.edu.cn
- Mayank VariaBoston University, Computing and Data SciencesEmail verificata su bu.edu
- Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityEmail verificata su duke.edu
- Nicolas AlhaddadBoston UniversityEmail verificata su bu.edu
- Matt FranklinProfessor of Computer Science, U. C. DavisEmail verificata su cs.ucdavis.edu
- Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisEmail verificata su lbl.gov
- Chao LiuUMBCEmail verificata su umbc.edu
- Hein MelingProfessor of Computer Science, University of Stavanger, NorwayEmail verificata su uis.no
- James ClavinUMBCEmail verificata su umbc.edu
- Yelena YeshaUniversity of Maryland, Baltimore CountyEmail verificata su umbc.edu
- Sharada SundaramStanford UniversityEmail verificata su cs.stanford.edu
- Phillip RogawayUC DavisEmail verificata su cs.ucdavis.edu
- Xin WangPostdoc, Tsinghua UniversityEmail verificata su mail.tsinghua.edu.cn
- Alan T. ShermanProfessor of Computer Science, Dept. of CSEE, University of Maryland, Baltimore CountyEmail verificata su umbc.edu
- Farid JavaniUniversity of Maryland, Baltimore CountyEmail verificata su umbc.edu
- Enis GolaszewskiEmail verificata su umbc.edu
- Zhuolun XiangAptosEmail verificata su aptoslabs.com
- Ling RenAssistant Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- Lucy C EricksonGoogleEmail verificata su google.com