Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Shan LuProfessor of Computer Science, University of ChicagoEmail verificata su uchicago.edu
- Wei ZhangIBM T.J.Watson Research CenterEmail verificata su us.ibm.com
- Linhai SongAssociate Professor, Pennsylvania State UniversityEmail verificata su ist.psu.edu
- Ben LiblitAmazon Web ServicesEmail verificata su amazon.com
- Xiao YuResearch Manager, Machine Learning & Security, Stellar CyberEmail verificata su stellarcyber.ai
- Thomas RepsJ. Barkley Rosser Professor & Rajiv and Ritu Batra Chair, Comp. Sci. Dept., Univ. of WisconsinEmail verificata su cs.wisc.edu
- Junghee LimSoftware Engineer, GrammaTechEmail verificata su grammatech.com
- Joy ArulrajGeorgia Institute of TechnologyEmail verificata su gatech.edu
- Pallavi JoshiSoftware Engineer, ClouderaEmail verificata su cloudera.com
- Aditya ThakurDepartment of Computer Science, University of California, DavisEmail verificata su ucdavis.edu
- Xiaohui (Helen) Gu (顾晓晖)North Carolina State UniversityEmail verificata su csc.ncsu.edu
- Rui GuColumbia UniversityEmail verificata su cs.columbia.edu
- William EnckProfessor of Computer Science, North Carolina State UniversityEmail verificata su ncsu.edu
- Peipei WangByteDanceEmail verificata su bytedance.com
- Karthikeyan SankaralingamProfessor of Computer Science, University of Wisconsin-MadisonEmail verificata su cs.wisc.edu
- Shanxiang Qi (戚善翔)DidiEmail verificata su uber.com
- Weimin ZhengTsinghua UniversityEmail verificata su tsinghua.edu.cn
- Jinglei RenMericoEmail verificata su merico.dev
- Ang LiPh.D. Candidate of Electrical and Computer Engineering, University of Madison, WisconsinEmail verificata su wisc.edu
- Somesh JhaLubar Chair of Computer Science, University of WisconsinEmail verificata su cs.wisc.edu