Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Matthias GrundmannGoogle ResearchEmail verificata su google.com
- Liangkai ZhangGoogle ResearchEmail verificata su google.com
- Shobha VasudevanProfessor of Computer Engineering, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Tingbo HouGoogle ResearchEmail verificata su google.com
- Mahdi FazeliAssociate Professor, School of Information Technology, Halmstad UniversityEmail verificata su hh.se
- Artsiom AblavatskiGoogle ResearcgEmail verificata su google.com
- Hossein AsadiProfessor, Department of Computer Engineering, Sharif University of TechnologyEmail verificata su sharif.edu
- Jayanand Asok KumarUniversity of Illinois at Urbana-Champaign, Qualcomm AtherosEmail verificata su qca.qualcomm.com
- Mehdi B. TahooriProfessor of Computer Science, Karlsruhe Institute of Technology, GermanyEmail verificata su kit.edu
- Genzhi YeSoftware Engineer, Google Inc.Email verificata su google.com
- Chenjie GuDeepMindEmail verificata su google.com
- Eli ChiproutIntel Corporation Strategic CAD labsEmail verificata su intel.com
- HV PoorMichael Henry Strater University Professor, Princeton UniversityEmail verificata su princeton.edu
- Rasoul EtesamiUniversity of Illinois Urbana-ChampaignEmail verificata su illinois.edu
- Nahid Farhady GhalatySecurity ML EngineerEmail verificata su vt.edu