Crea il mio profilo
Accesso pubblico
Visualizza tutto26 articoli
15 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ismail GuvencNorth Carolina State UniversityEmail verificata su ncsu.edu
- Rudra DuttaProfessor of Computer Science, North Carolina State UniversityEmail verificata su ncsu.edu
- Peter BauerProfessor of Electrical EngineeringEmail verificata su nd.edu
- Jangeun JunNetApp, Inc.Email verificata su netapp.com
- Maria KihlProfessor in Internetworked Systems, Dept. of Electrical and Information Technology, Lund UniversityEmail verificata su eit.lth.se
- Ozgur OzdemirAssociate Research ProfessorEmail verificata su ncsu.edu
- Injong RheeProfessor of Computer Science, North Carolina State UniversityEmail verificata su ncsu.edu
- Simran SinghNorth Carolina State UniversityEmail verificata su ncsu.edu
- Beakcheol JangYonsei UniversityEmail verificata su yonsei.ac.kr
- Alex DeanAssociate Professor of Electrical and Computer Engineering, North Carolina State UniversityEmail verificata su ncsu.edu
- Vuk MarojevicAssociate Professor, Mississippi StateEmail verificata su msstate.edu
- Huaiyu DaiProfessor of Electrical and Computer Engineering, NC State UniversityEmail verificata su ncsu.edu
- Sung Joon MaengHanyang University, ERICAEmail verificata su hanyang.ac.kr
- Ajit WarrierSilvus TechnologiesEmail verificata su silvustechnologies.com
- Brian A. FloydAlton & Mildred Lancaster Professor in Electrical & Computer Engineering, NC State UniversityEmail verificata su ncsu.edu
- Arupjyoti BhuyanDirector, INL Wireless Security InstituteEmail verificata su inl.gov
- Frank MuellerProfessor of Computer Science, North Carolina State UniversityEmail verificata su cs.ncsu.edu
- Edgar LobatonNorth Carolina State UniversityEmail verificata su ncsu.edu
- Magreth MushiResearch AssociateEmail verificata su ncsu.edu
- Tahmid Latif, PhDWentworth Institute of TechnologyEmail verificata su wit.edu