Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaEmail verificata su kaist.ac.kr
- Kevin FuProfessor, Northeastern University, ECE and Khoury College of Computer SciencesEmail verificata su northeastern.edu
- Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaEmail verificata su umn.edu
- Timothy HeckmanProfessor of Physics & Astronomy, Johns Hopkins UniversityEmail verificata su jhu.edu
- Michael RushananPhD Student of Computer Science, Johns Hopkins UniversityEmail verificata su cs.jhu.edu
- Eugene VassermanKansas State UniversityEmail verificata su ksu.edu
- Wenyuan XuProfessor, IEEE Fellow, Zhejiang University, College of EEEmail verificata su zju.edu.cn
- David MohaisenProfessor of Computer Science, University of Central FloridaEmail verificata su ucf.edu
- Shane ClarkSkydioEmail verificata su skydio.com
- Colleen M. SwansonEmail verificata su travellingcryptographer.com
- Benjamin RansfordStripeEmail verificata su ransford.org
- Max SchuchardAssistant Professor, University of TennesseeEmail verificata su utk.edu
- Soumitri KolavennuU.S. BankEmail verificata su usbank.com
- Aviel D. RubinProfessor of Computer Science, Johns Hopkins UniversityEmail verificata su jhu.edu
- Younghwan GoCisco MerakiEmail verificata su meraki.net
- KyoungSoo ParkKAISTEmail verificata su kaist.ac.kr
- Peng WangQualcommEmail verificata su qti.qualcomm.com
- Thomas CrawfordUniversity of MichiganEmail verificata su umich.edu
- Daniel HolcombAssociate Professor, University of MassachusettsEmail verificata su engin.umass.edu
- Zi LinUniversity of MinnesotaEmail verificata su cs.umn.edu