Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Robert HeathCharles Lee Powell Chair in Wireless Communication, University of California, San DiegoEmail verificata su ucsd.edu
- Rishabh SinghResearch Scientist, Google BrainEmail verificata su google.com
- Christopher WagnerPurdue UniversityEmail verificata su purdue.edu
- Milind KulkarniAssociate Professor of Electrical and Computer Engineering, Purdue UniversityEmail verificata su purdue.edu
- Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusEmail verificata su cispa.saarland
- Thomas HenzingerIST AustriaEmail verificata su ist.ac.at
- Loris D'AntoniUniversity of Wisconsin, MadisonEmail verificata su cs.wisc.edu
- Arjun RadhakrishnaMicrosoftEmail verificata su microsoft.com
- Jyotirmoy V. DeshmukhAssociate Professor, University of Southern CaliforniaEmail verificata su usc.edu
- Nageen HimayatEmail verificata su ieee.org
- Thorsten TarrachAmazon Web ServicesEmail verificata su amazon.com
- Bishwarup MondalIntelEmail verificata su intel.com
- Swarat ChaudhuriProfessor of Computer Science, The University of Texas at AustinEmail verificata su cs.utexas.edu
- Pavol CernyProfessor, TU WienEmail verificata su tuwien.ac.at
- Leonid RyzhykFelderaEmail verificata su feldera.com
- Edmund ClarkeUniversity Professor Emeritus at Carnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityEmail verificata su cs.purdue.edu
- Brian L. EvansEngineering Foundation Professor, ECE, WNCG, University of Texas at AustinEmail verificata su ece.utexas.edu
- Jan OtopUniversity of WrocławEmail verificata su cs.uni.wroc.pl
- Shengwei AnPurdue UniversityEmail verificata su purdue.edu
Segui