Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mitchell A ThorntonSouthern Methodist University, Darwin Deason Institute for Cyber SecurityEmail verificata su ieee.org
- Jennifer DworakSouthern Methodist UniversityEmail verificata su lyle.smu.edu
- Kundan NepalUniversity of St. Thomas, Saint Paul, MNEmail verificata su stthomas.edu
- R. Iris BaharSchool of Engineering, Dept. of Computer Science, Brown UniversityEmail verificata su brown.edu
- Suku NairUniversity Distinguished Professor of Computer Science and Engineering, SMU, DallasEmail verificata su smu.edu
- Shinobu NagayamaHiroshima City UniversityEmail verificata su hiroshima-cu.ac.jp
- Ping GuiSouthern Methodist UniversityEmail verificata su smu.edu
- Debarshi ChatterjeeNvidia CorporationEmail verificata su nvidia.com
- Yi SunSouthern Methodist UniversityEmail verificata su smu.edu
- Soha AlhelalySaudi Electronic UniversityEmail verificata su seu.edu.sa
- Tsutomu SasaoVisiting Professor, Meiji UniversityEmail verificata su cs.meiji.ac.jp
- Poramate OngsakornSouthern Methodist UniversityEmail verificata su lyle.smu.edu
- Kaitlin N. SmithNorthwestern UniversityEmail verificata su northwestern.edu
- Igor L. MarkovSynopsysEmail verificata su synopsys.com
- Phillip LaplanteNIST/Penn StateEmail verificata su psu.edu