Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Xin LiJohns Hopkins UniversityEmail verificata su cs.jhu.edu
- Kuan ChengPeking UniversityEmail verificata su pku.edu.cn
- Elaine ShiCarnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Zhengzhong JinNortheastern UniversityEmail verificata su northeastern.edu
- Bernhard HaeuplerETH Zurich & Carnegie Mellon UniversityEmail verificata su inf.ethz.ch
- Amirbehshad ShahrasbiMicrosoftEmail verificata su microsoft.com
- Venkatesan GuruswamiUniversity of California, BerkeleyEmail verificata su berkeley.edu
- Ryan GabrysResearcher at Naval Information Warfare Center and UCSDEmail verificata su spawar.navy.mil
- João RibeiroNOVA LINCS & Universidade Nova de LisboaEmail verificata su fct.unl.pt
- Gilad AsharovDepartment of Computer Science, Bar-Ilan UniversityEmail verificata su biu.ac.il
- Aaron B. WagnerProfessor, Electrical and Computer Engineering, Cornell UniversityEmail verificata su cornell.edu
- Ilan KomargodskiHebrew UniversityEmail verificata su cs.huji.ac.il
- Shin'ichiro MatsuoResearch Professor of Computer Science, Georgetown UniversityEmail verificata su georgetown.edu