Crea il mio profilo
Accesso pubblico
Visualizza tutto50 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Christos FaloutsosCMUEmail verificata su cs.cmu.edu
Leman AkogluAssociate Professor, Carnegie Mellon UniversityEmail verificata su andrew.cmu.edu
Hanghang TongUniversity of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
Tina Eliassi-RadProfessor, Northeastern UniversityEmail verificata su eliassi.org
U KangProfessor of Computer Science and Engineering, Seoul National UniversityEmail verificata su snu.ac.kr
Brian GallagherComputer Scientist, Lawrence Livermore National LaboratoryEmail verificata su llnl.gov
Evangelos E. PapalexakisAssociate Professor, University of California RiversideEmail verificata su cs.ucr.edu
Jilles VreekenCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
Michele BerlingerioNovartis - Insight Strategy & DesignEmail verificata su novartis.com
Stephan GünnemannProfessor of Computer Science, Technical University of MunichEmail verificata su in.tum.de
Joshua T. VogelsteinDept of Biomedical Engineering, Johns Hopkins UniversityEmail verificata su jhu.edu
Duen Horng ChauAssociate Professor, Georgia Institute of TechnologyEmail verificata su gatech.edu
Sugato BasuDistinguished Scientist at GoogleEmail verificata su google.com
Walter S. Lasecki-Email verificata su umich.edu
Hsing-Kuo PaoNational Taiwan University of Science and TechnologyEmail verificata su mail.ntust.edu.tw
Miguel AraujoSemasioEmail verificata su semasio.com
Paul N. BennettPartner Research Manager, Microsoft ResearchEmail verificata su microsoft.com
Aaditya RamdasStatistics and Machine Learning, Carnegie Mellon UniversityEmail verificata su stat.cmu.edu
Eric HorvitzMicrosoft ResearchEmail verificata su microsoft.com
Wolfgang GatterbauerKhoury College of Computer Sciences, Northeastern UniversityEmail verificata su northeastern.edu