Crea il mio profilo
Accesso pubblico
Visualizza tutto23 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yongqiang XiongMicrosoft Research AsiaEmail verificata su microsoft.com
- Dan PeiAssociate Professor of Computer Science, Tsinghua UniversityEmail verificata su tsinghua.edu.cn
- Bojie LiStealth StartupEmail verificata su os.ai
- Kun TanHUAWEI Technologies, Co. LTDEmail verificata su huawei.com
- Peng ChengMicrosoft ResearchEmail verificata su microsoft.com
- Ran ShuMicrosoft ResearchEmail verificata su microsoft.com
- Kaixin SuiMicrosoft ResearchEmail verificata su microsoft.com
- Xiaoliang WangAssociate Professor of Computer Science, Nanjing UniversityEmail verificata su nju.edu.cn
- Layong LuoMicrosoftEmail verificata su microsoft.com
- Changhua PeiAssociate Professor, Computer Network Information Center, CASEmail verificata su cnic.cn
- Keqin Li (李克勤)SUNY Distinguished Professor, National Distinguished Professor, MAE, AAAS/IEEE/AAIA/ACIS/AIIA FellowEmail verificata su newpaltz.edu
- Minghua MaMicrosoftEmail verificata su microsoft.com
- Dan LiTsinghua UniversityEmail verificata su tsinghua.edu.cn
- Wencong XiaoAlibaba GroupEmail verificata su alibaba-inc.com
- Zain Zhenyuan RuanMIT CSAILEmail verificata su csail.mit.edu
- Hong XuAssociate Professor, Computer Science and Engineering, Chinese University of Hong KongEmail verificata su cuhk.edu.hk
- Keith WinsteinAssociate Professor of Computer Science, Stanford UniversityEmail verificata su cs.stanford.edu
- Dongsu HanProfessor, KAISTEmail verificata su kaist.ac.kr
- Kenli LiCheung Kong Professor, Hunan UniversityEmail verificata su hnu.edu.cn
- Yuanwei LuAI Stealth Startup