Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Calvin B. SawyerProfessor, Clemson UniversityVerified email at clemson.edu
- Kuang-Ching WangClemson UniversityVerified email at clemson.edu
- Lee WardVerified email at sandia.gov
- Samir ChatterjeeProfessor & Fletcher Jones Chair of Information Systems, Claremont Graduate UniversityVerified email at cgu.edu
- Matthew CurrySandia National LaboratoriesVerified email at sandia.gov
- Rajani SadasivamUniversity of Massachusetts Medical SchoolVerified email at umassmed.edu
- Tarun AbhichandaniMind of NVerified email at mindofn.in
- Bengisu TuluProfessor of Information Technology, Worcester Polytechnic InstituteVerified email at wpi.edu
- Ninad MishraCDCVerified email at cdc.gov
- terndrup, tomemergency medicineVerified email at osumc.edu
- Ian T. FosterUniversity of Chicago and Argonne National LaboratoryVerified email at anl.gov
- Von WelchCybersecurity Researcher, Indiana UniversityVerified email at indiana.edu
- Charlie CatlettSenior Computer Scientist, Argonne National LaboratoryVerified email at anl.gov
- Dane SkowExecutive Director, CCAST, NDSUVerified email at skowfamily.org
- Y.F. Brook WuNew Jersey Institute of TechnologyVerified email at njit.edu
- Haiying ShenAssociate Professor of Computer Science, University of VirginiaVerified email at virginia.edu
- Guoxin LiuClemson UniversityVerified email at g.clemson.edu
- Michael BieberNew Jersey Institute of TechnologyVerified email at njit.edu
- Barrett BryantUniversity of North TexasVerified email at unt.edu
- Peter T. CummingsSchool of Engineering and Physical Sciences, Heriot-Watt UniversityVerified email at vanderbilt.edu