Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- James JoshiProfessor, SCI, University of Pittsburgh; Expert NSF-TIPEmail verificata su pitt.edu
- Chao LiBeijing Jiaotong University | University of PittsburghEmail verificata su pitt.edu
- Heiko LudwigResearch Manager, IBM ResearchEmail verificata su us.ibm.com
- Nathalie BaracaldoIBM Almaden Research Center, Senior Research Staff Member, Ph.D.Email verificata su pitt.edu
- Ali AnwarAssistant Professor, University of MinnesotaEmail verificata su umn.edu
- Yi ZhouResearch Staff Member, IBM ResearchEmail verificata su ibm.com
- Balaji PalanisamyAssociate Professor, School of Computing and Information, University of PittsburghEmail verificata su pitt.edu
- Bo LangBUAAEmail verificata su buaa.edu.cn
- Prashant KrishnamurthyProfessor, University of PittsburghEmail verificata su pitt.edu
- Jinlai XuByteDance USEmail verificata su bytedance.com
- Swanand R. KadheIBM ResearchEmail verificata su ibm.com
- Jiqiang LiuProfessor of Computer ScienceEmail verificata su bjtu.edu.cn
- Hayim ShaulmitEmail verificata su mit.edu
- David TipperSchool of Computing and Information, University of PittsburghEmail verificata su tele.pitt.edu
- Yuya Jeremy OngIBM ResearchEmail verificata su ibm.com
- laura wynterIBM Watson Research CenterEmail verificata su us.ibm.com
- Jianxin LiSchool of Computer Science & Engineering, Beihang UniversityEmail verificata su act.buaa.edu.cn
- Eyal KushnirCryptography researcher at IBM Research Israel, MSc student at TechnionEmail verificata su ibm.com
- Timothy CastigliaPhD student at Rensselaer Polytechnic InstituteEmail verificata su rpi.edu
- Shiqiang WangIBM T. J. Watson Research CenterEmail verificata su us.ibm.com