Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Farshid FarhatEmail verificata su psu.edu
- Puneet SharmaHewlett Packard Labs, HP LabsEmail verificata su hpe.com
- Thomas La PortaPenn State UniversityEmail verificata su cse.psu.edu
- Novella BartoliniProfessor of Computer Networks, Sapienza University of RomeEmail verificata su uniroma1.it
- Ting HeComputer Science and Engineering, Pennsylvania State UniversityEmail verificata su cse.psu.edu
- Faraz AhmedHewlett Packard Labs (HPE)Email verificata su hpe.com
- Hana KhamfroushAssociate Professor, University of KentuckyEmail verificata su cs.uky.edu
- Junguk(Jungwook) ChoAWSEmail verificata su utah.edu
- Lianjie CaoHewlett Packard LabsEmail verificata su hpe.com
- Anu MercianGoogleEmail verificata su google.com
- Mihalis YannakakisPercy K. and Vida L. W. Hudson Professor of Computer Science, Columbia UniversityEmail verificata su cs.columbia.edu
- Mohammad Reza PakravanSharif University of TechnologyEmail verificata su sharif.edu
- Mohammad Reza ArefProfessor of Electrical Engineering, Sharif university of TechnologyEmail verificata su sharif.edu
- Stefan AchleitnerDynatrace, Cloud Native Security ResearchEmail verificata su stefanachleitner.com
- Nilanjan Ray ChaudhuriAssociate Professor, Penn StateEmail verificata su engr.psu.edu
- He YuxiongMicrosoft ResearchEmail verificata su microsoft.com
- Vivek AdarshUniversity of California, Santa BarbaraEmail verificata su cs.ucsb.edu
- Paolo FaraboschiHewlett Packard LabsEmail verificata su faraboschi.com
- Stefano CiavarellaP.h.D @ University Sapienza of RomeEmail verificata su di.uniroma1.it
- Kathryn S McKinleyGoogleEmail verificata su cs.utexas.edu