Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yunsi FeiProfessor of Electrical and Computer Engineering, Northeastern UniversityEmail verificata su ece.neu.edu
- Yukui LuoUniversity of Massachusetts DartmouthEmail verificata su umassd.edu
- Yanzhi WangNortheastern UniversityEmail verificata su northeastern.edu
- Xiaolin Xu (徐啸林)Northeastern UniversityEmail verificata su northeastern.edu
- Siyue WangResearch Scientist, MicrosoftEmail verificata su northeastern.edu
- pu zhaoNortheastern UniversityEmail verificata su husky.neu.edu
- Xue LinNortheastern UniversityEmail verificata su northeastern.edu
- Majid SabbaghNortheastern UniversityEmail verificata su husky.neu.edu
- Thomas WahlNortheastern University, Boston, USAEmail verificata su northeastern.edu
- Aidong Adam DingAssociate Professor of Mathematics, Northeastern UniversityEmail verificata su neu.edu
- Ruyi DingNortheastern UniversityEmail verificata su northeastern.edu
- TIANHONG XUPhd student, Northeastern UniversityEmail verificata su northeastern.edu
- Hongjia LiApplied Scientist, AmazonEmail verificata su amazon.com
- Geng YuanUniversity of GeorgiaEmail verificata su uga.edu
- Guang GongProfessor, Dept. ECE, University of WaterlooEmail verificata su uwaterloo.ca
- Kalikinkar MandalAssistant Professor at University of New Brunswick, FrederictonEmail verificata su uwaterloo.ca
- Raghvendra RohitLead Cryptographer, Technology Innovation Institute, Abu DhabiEmail verificata su tii.ae
- Nusa ZidaricLeiden UniversityEmail verificata su liacs.leidenuniv.nl
- Anantha ChandrakasanDean of Engineering, Massachusetts Institute of TechnologyEmail verificata su mit.edu
- Kyungmi LeePh.D. Student, Massachusetts Institute of TechnologyEmail verificata su mit.edu