Crea il mio profilo
Accesso pubblico
Visualizza tutto20 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ben LiblitAmazon Web ServicesEmail verificata su amazon.com
- James W DEMMELProfessor of EECS and Mathematics, UC BerkeleyEmail verificata su berkeley.edu
- Hui GuoUniversity of California, DavisEmail verificata su ucdavis.edu
- Daniel DeFreezSouthern Oregon UniversityEmail verificata su sou.edu
- Costin IancuSenior Staff Scientist, Lawrence Berkeley National LaboratoryEmail verificata su lbl.gov
- Koushik SenProfessor of Computer Science, University of California, BerkeleyEmail verificata su cs.berkeley.edu
- Haryadi S. GunawiAssociate Professor of Computer Science, University of ChicagoEmail verificata su cs.uchicago.edu
- David A. TomassiUniversity of California, DavisEmail verificata su ucdavis.edu
- Aditya ThakurDepartment of Computer Science, University of California, DavisEmail verificata su ucdavis.edu
- Andrea Arpaci-DusseauProfessor Computer Science, University of Wisconsin-MadisonEmail verificata su cs.wisc.edu
- Remzi Arpaci-DusseauUniversity of Wisconsin-MadisonEmail verificata su cs.wisc.edu
- Hong Diep NguyenUC BerkeleyEmail verificata su ens-lyon.org
- Bogdan VasilescuAssociate Professor at Carnegie Mellon UniversityEmail verificata su cmu.edu
- Prem DevanbuDistinguished Research Professor (பேராசிரியர்), ACM FellowEmail verificata su ucdavis.edu
- Shuvendu LahiriSenior Principal Researcher, Microsoft ResearchEmail verificata su microsoft.com
- Patrice GodefroidLaceworkEmail verificata su lacework.net
- Baishakhi RayAssociate Professor, Columbia UniversityEmail verificata su cs.columbia.edu
- Yagnik SuchakApple Inc.Email verificata su ucdavis.edu
- Stephan ArltFederal Office for Information SecurityEmail verificata su bsi.bund.de
- Natarajan ShankarSRI International Computer Science LaboratoryEmail verificata su csl.sri.com