Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Petros ZerfosIBM T.J. Watson Research CenterEmail verificata su us.ibm.com
- Boleslaw SzymanskiClaire and Roland Schmitt Distinguished Professor of Computer Science, Rensselaer PolytechnicEmail verificata su rpi.edu
- Christopher GibsonIBM Research, IBM UKEmail verificata su uk.ibm.com
- Dominic HarriesIBMEmail verificata su uk.ibm.com
- Chatschik BisdikianIBM ResearchEmail verificata su us.ibm.com
- Sahin Cem GeyikFacebookEmail verificata su fb.com
- Konstantin KuzminLecturer, Rensselaer Polytechnic Institute (RPI), Department of Computer ScienceEmail verificata su cs.rpi.edu
- Sanmay DasProfessor of Computer Science, George Mason UniversityEmail verificata su gmu.edu
- Jorge LoboICREA - Universitat Pompeu FabraEmail verificata su upf.edu
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteEmail verificata su cardiff.ac.uk
- Meenal ChhabraStudent at Rensselaer Polytechnic InstituteEmail verificata su rpi.edu
- Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterEmail verificata su us.ibm.com
- Henry MarkramProfessor of Neuroscience, EPFLEmail verificata su epfl.ch
- John IbbotsonIBM UK LtdEmail verificata su uk.ibm.com
- Geeth de MelResearch Staff MemberEmail verificata su uk.ibm.com