Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
7 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteEmail verificata su cardiff.ac.uk
- Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneEmail verificata su capitalone.com
- Daniel HarborneCrime and Security Research Institute, Cardiff UniversityEmail verificata su cardiff.ac.uk
- Dave BrainesIBM Research, UKEmail verificata su uk.ibm.com
- Prudhvi GurramJHU/APLEmail verificata su ieee.org
- Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAEmail verificata su ucla.edu
- Moustafa F. AlzantotGoogle ResearchEmail verificata su google.com
- Federico CeruttiUniversity of BresciaEmail verificata su unibs.it
- Ramya RaghavendraIBM TJ Watson Research CenterEmail verificata su fb.com
- Simon JulierUCLEmail verificata su cs.ucl.ac.uk
- Murat SensoyDepartment of Computer Science, University College LondonEmail verificata su ucl.ac.uk
- Lance KaplanArmy Research LaboratoryEmail verificata su mail.mil
- Mark O. CunninghamDiscipline of Physiology, Trinity College DublinEmail verificata su tcd.ie
- Marc Alwin GieselmannNewcastle UniversityEmail verificata su ncl.ac.uk
- Marcus KaiserProfessor, School of Medicine, University of Nottingham, UK. Twitter: @ConnectomeLabEmail verificata su nottingham.ac.uk
- Ian TaylorUniversity of Notre DameEmail verificata su nd.edu
- Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterEmail verificata su us.ibm.com
- Erin ZaroukianUS Army Research LaboratoryEmail verificata su jhu.edu
- Nick O'LearyEmerging Technology Services, IBM UKEmail verificata su uk.ibm.com
- Jonathan Z BakdashAgency for Healthcare Research and QualityEmail verificata su ahrq.hhs.gov