Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Stephan DiestelhorstSystem Architect, AMDEmail verificata su amd.com
- Vaibhav GogteGoogleEmail verificata su umich.edu
- Thomas F. WenischProf. of CSE, University of MichiganEmail verificata su umich.edu
- Satish NarayanasamyUniversity of MichiganEmail verificata su umich.edu
- Peter M. ChenUniversity of MichiganEmail verificata su umich.edu
- Geoff V MerrettProfessor, University of Southampton | Head of Centre for IoT and Pervasive SystemsEmail verificata su ecs.soton.ac.uk
- Alex S WeddellAssociate Professor, Electronics and Computer Science, University of SouthamptonEmail verificata su ecs.soton.ac.uk
- Sivert T. SliperPhD, Electronics & Computer Science, University of SouthamptonEmail verificata su lyse.net
- Nikos NikolerisPrincipal Research Engineer, Arm ResearchEmail verificata su arm.com
- Wendy ElsasserEmail verificata su arm.com
- Aasheesh KolliPennsylvania State University and VMware ResearchEmail verificata su psu.edu
- Prakash RamrakhyaniResearcher, Arm IncEmail verificata su arm.com
- Andreas SandbergPrincipal Engineer, Arm Ltd.Email verificata su arm.com
- Mrinmoy GhoshFacebookEmail verificata su fb.com
- Dam SunwooSenior Principal Research Engineer, Arm ResearchEmail verificata su arm.com
- Yan SolihinCharles N. Millican Chair Professor of Computer Science at UCF, Director for Cybersecurity andEmail verificata su ucf.edu
- Mohammad A. AlshboulJordan University of Science and TechnologyEmail verificata su just.edu.jo
- James TuckProfessor of Electrical and Computer Engineering at North Carolina State UniversityEmail verificata su ncsu.edu
- James BruseyProfessor of Computer Science, Coventry UniversityEmail verificata su coventry.ac.uk
- Duncan McFarlaneUniversity of CambridgeEmail verificata su eng.cam.ac.uk