Crea il mio profilo
Accesso pubblico
Visualizza tutto23 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Lei YingProfessor at the University of Michigan, Ann ArborEmail verificata su umich.edu
- Junshan ZhangElectrical and Computer Engineering, UC Davis (Google Scholar not updated since 2020)Email verificata su ucdavis.edu
- Mor Harchol-BalterBruce J. Nelson Professor of Computer Science, Carnegie Mellon UniversityEmail verificata su cs.cmu.edu
- R. SrikantUniversity of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Kai ZhuResearch Assistant in Arizona State UniversityEmail verificata su asu.edu
- Siva Theja MaguluriGeorgia Institute of TechnologyEmail verificata su gatech.edu
- Xiaohan KangPostdoc at University of Illinois at Urbana–ChampaignEmail verificata su illinois.edu
- Alan Scheller-WolfTepper School of Business, Carnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Haotian JiangPostdoc Researcher at Microsoft Research, RedmondEmail verificata su microsoft.com
- Giulia FantiCarnegie Mellon University, ECE DepartmentEmail verificata su andrew.cmu.edu
- Juan Jose JaramilloData Engineer, Cisco Tetration AnalyticsEmail verificata su cisco.com