Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- RUILONG XIEIBMEmail verificata su ibm.com
- Steven BentleyGLOBALFOUNDRIESEmail verificata su globalfoundries.com
- Kang L. WangElectrical Engineering DepartmentEmail verificata su ee.ucla.edu
- Ali KhakifiroozIntelEmail verificata su intel.com
- Magnus WillanderEmail verificata su liu.se
- Faxian XiuPhysics Department, Fudan UniversityEmail verificata su fudan.edu.cn
- Nicolas LOUBETIBM ResearchEmail verificata su us.ibm.com
- Alexander KhitunUniversity of California RiversideEmail verificata su engr.ucr.edu
- K RimQualcommEmail verificata su qti.qualcomm.com
- Dmitri E. NikonovDistinguished Engineer, Kepler ComputingEmail verificata su intel.com
- Serge OktyabrskySUNY Polytechnic InstituteEmail verificata su sunypoly.edu
- Jianshi TangTsinghua University / IBM Research / UCLAEmail verificata su tsinghua.edu.cn
- Kos Galatsis Ph.D.President of Forensics DetectorsEmail verificata su forensicsdetectors.com
- Vwani RoychowdhuryProfessor of Electrical and Computer Engineering, UCLAEmail verificata su ee.ucla.edu
- Nikolay PetkovStaff Researcher, Tyndall National Institute, IrelandEmail verificata su tyndall.ie
- Per LundgrenAssociate Professor, Chalmers University of TechnologyEmail verificata su chalmers.se
- D. S. MisraPhysics Department, Indian Institute of Technology BombayEmail verificata su iitb.ac.in
Segui
Ajey Jacob
Information Sciences Institute, University of Southern California
Email verificata su isi.edu