Crea il mio profilo
Accesso pubblico
Visualizza tutto25 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Tianwei ZhangNanyang Technological UniversityEmail verificata su ntu.edu.sg
- Fangfei LiuIntel CorporationEmail verificata su intel.com
- Jakub SzeferAssociate Professor of Electrical Engineering, Yale UniversityEmail verificata su yale.edu
- Zhijie Jerry ShiUniversity of ConnecticutEmail verificata su uconn.edu
- Zecheng HeMeta GenAIEmail verificata su meta.com
- Gernot HeiserProfessor of Computer Science, University of New South WalesEmail verificata su unsw.edu.au
- Qian GeGoogleEmail verificata su google.com
- Yuval YaromRuhr University BochumEmail verificata su rub.de
- Anand RaghunathanProfessor of Electrical and Computer Engineering, Purdue UniversityEmail verificata su purdue.edu
- Pramod JamkhedkarAT&T Labs - ResearchEmail verificata su research.att.com
- Yinqian ZhangProfessor, Southern University of Science and TechnologyEmail verificata su acm.org
- Jennifer RexfordProfessor of Computer Science, Princeton UniversityEmail verificata su cs.princeton.edu
- Eric KellerUniversity of Colorado, BoulderEmail verificata su colorado.edu
- David KarigClemson UniversityEmail verificata su alumni.princeton.edu
- Diego Perez-BoteroPrinceton University AlumniEmail verificata su cs.princeton.edu
- Nachiketh PotlapallyOracle (ex-AWS, ex-Intel), PhD (CSE, Princeton University)Email verificata su alumni.princeton.edu
- Lionel TORRESLIRMMEmail verificata su lirmm.fr
- Hao WuGraduate Student, Princeton UniversityEmail verificata su princeton.edu
- Manish VachharajaniUnbounded SystemsEmail verificata su unbounded.systems
- Yiqun Lisa YinIndependent Security ConsultantEmail verificata su alum.mit.edu