Crea il mio profilo
Accesso pubblico
Visualizza tutto62 articoli
7 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ing-Ray ChenVirginia TechEmail verificata su vt.edu
- Sibel AdaliProfessor of Computer Science, Associate Dean of Science for Research, Rensselaer PolytechnicEmail verificata su cs.rpi.edu
- Feng ChenDepartment of Computer Science, UT DallasEmail verificata su utdallas.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsEmail verificata su uccs.edu
- Noam Ben-AsherBoston FusionEmail verificata su bostonfusion.com
- John O'DonovanTeladoc Health Inc. and Computer Science Dept., University of California, Santa BarbaraEmail verificata su cs.ucsb.edu
- Chang-Tien LuComputer Science, Virginia TechEmail verificata su vt.edu
- Richard Garcia-LebronUniversity of Texas at San AntonioEmail verificata su utsa.edu
- Alessandro OltramariBosch Research and Technology CenterEmail verificata su us.bosch.com
- Ding-Chau WangDepartment of Information Management, Southern Taiwan University of Science and TechnologyEmail verificata su stust.edu.tw
- Tarek AbdelzaherUniversity of IllinoisEmail verificata su illinois.edu
- Hasan CamBest BuyEmail verificata su bestbuy.com
- Prasant MohapatraProfessor of Computer Science and Engineering, University of South FloridaEmail verificata su usf.edu
- Sujoy SikdarAssistant Professor, Binghamton UniversityEmail verificata su binghamton.edu
- Gulustan DoganUniversity of North Carolina WilmingtonEmail verificata su uncw.edu
- Ted Brownprofessor computer science, queensEmail verificata su gc.cuny.edu
- Sencun ZhuPennsylvania State UniversityEmail verificata su cse.psu.edu
- Xin ChenThe Pennsylvania State UniversityEmail verificata su psu.edu
- Jennifer MangelsBaruch College, CUNYEmail verificata su baruch.cuny.edu
- Jianxi GaoAssociate Professor of Computer Science, Rensselaer Polytechnic InstituteEmail verificata su rpi.edu