Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- David JensenProfessor of Computer Science, University of Massachusetts AmherstEmail verificata su cs.umass.edu
- Prashant ShenoyDistinguished Professor, College of Information and Computer Sciences, University of MassachusettsEmail verificata su cs.umass.edu
- Kaleigh ClaryMS/PhD Student, University of Massachusetts, AmherstEmail verificata su cs.umass.edu
- Michael LittmanBrown UniversityEmail verificata su brown.edu
- Emma ToschResearcher, Northeastern UniversityEmail verificata su northeastern.edu
- Sam WittyResearch Scientist - Basis Research InstituteEmail verificata su basis.ai
- Teresa M. HarrisonProfessor of Communication, University at AlbanyEmail verificata su albany.edu
- S. S. RaviResearch Professor, Biocomplexity Institute, University of VirginiaEmail verificata su virginia.edu
- Catherine Dumas PhDAssistant Professor, SUNY AlbanyEmail verificata su albany.edu
- Tim FakeOptiv Cybersecurity, University at AlbanyEmail verificata su albany.edu
- Jun Ki LeeResearch Assistant, Brown UniversityEmail verificata su brown.edu
- Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & CRISP; Purdue UniversityEmail verificata su purdue.edu
- Ran XuPurdue UniversityEmail verificata su purdue.edu
- Tarek AbdelzaherUniversity of IllinoisEmail verificata su illinois.edu
- Ramesh GovindanProfessor of Computer Science, University of Southern CaliforniaEmail verificata su usc.edu
- Nic DePaulaWayne State UniversityEmail verificata su wayne.edu
- Vivek K. SinghRutgers UniversityEmail verificata su mit.edu
- William MayAtmospheric Sciences Research CenterEmail verificata su albany.edu
- Huseyin OktayUniversity of Massachusetts, AmherstEmail verificata su cs.umass.edu
- Ritwik SinhaAdobe ResearchEmail verificata su adobe.com