Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Shan LuProfessor of Computer Science, University of ChicagoEmail verificata su uchicago.edu
Wei ZhangIBM T.J.Watson Research CenterEmail verificata su us.ibm.com
Linhai SongCollege of Information Sciences and Technology, The Pennsylvania State UniversityEmail verificata su ist.psu.edu
Ben LiblitAmazon Web ServicesEmail verificata su amazon.com
Xiao YuResearch Manager, Machine Learning & Security, Stellar CyberEmail verificata su stellarcyber.ai
Thomas RepsJ. Barkley Rosser Professor & Rajiv and Ritu Batra Chair, Comp. Sci. Dept., Univ. of WisconsinEmail verificata su cs.wisc.edu
Junghee LimSoftware Engineer, GrammaTechEmail verificata su grammatech.com
Joy ArulrajGeorgia Institute of TechnologyEmail verificata su gatech.edu
Pallavi JoshiSoftware Engineer, ClouderaEmail verificata su cloudera.com
Aditya ThakurDepartment of Computer Science, University of California, DavisEmail verificata su ucdavis.edu
Xiaohui (Helen) Gu (顾晓晖)North Carolina State UniversityEmail verificata su csc.ncsu.edu
Rui GuColumbia UniversityEmail verificata su cs.columbia.edu
William EnckProfessor of Computer Science, North Carolina State UniversityEmail verificata su ncsu.edu
Peipei WangByteDanceEmail verificata su bytedance.com
Karthikeyan SankaralingamProfessor of Computer Science, University of Wisconsin-MadisonEmail verificata su cs.wisc.edu
Shanxiang Qi (戚善翔)DidiEmail verificata su uber.com
Weimin ZhengTsinghua UniversityEmail verificata su tsinghua.edu.cn
Jinglei RenMericoEmail verificata su merico.dev
Ang LiPh.D. Candidate of Electrical and Computer Engineering, University of Madison, WisconsinEmail verificata su wisc.edu
Yongwei WUTsinghua UniversityEmail verificata su tsinghua.edu.cn