Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Y. Charlie HuMichael and Katherine Birck Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
- Abhinav PathakAppleVerified email at purdue.edu
- Ning DingResearch Assistant at ECE, Purdue UniversityVerified email at purdue.edu
- Xiaomeng ChenPurdue UniversityVerified email at purdue.edu
- Faez AhmedABS Assistant Professor, MITVerified email at mit.edu
- Kalyanmoy DebUniversity Distinguished Professor, Electrical and Computer Engineering, Michigan State UniversityVerified email at egr.msu.edu
- Rath VannithambyIntel CorporationVerified email at intel.com
- Ana NikaPrincipal Software Engineer at MicrosoftVerified email at microsoft.com
- Haitao ZhengNeubauer Professor of Computer Science, University of ChicagoVerified email at cs.uchicago.edu
- Ben Y. ZhaoNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
- Xia ZhouAssociate Professor, Columbia UniversityVerified email at cs.columbia.edu
- Graham FinlaysonUniversity of East Anglia, Apple Inc, NTNU, Simon Fraser UniversityVerified email at uea.ac.uk
- Mark S. DrewSimon Fraser UniversityVerified email at cs.sfu.ca
- Pulkit AgrawalMassachusetts Institute of TechnologyVerified email at mit.edu
- Bhiksha RajCarnegie Mellon UniversityVerified email at cs.cmu.edu
- Gahgene GweonSeoul National UniversityVerified email at snu.ac.kr
- Nitish SrivastavaResearch Scientist, AppleVerified email at cs.toronto.edu
- Carolyn Penstein RoseKavcic-Moura Professor of Computer Science, LTI and HCII, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Yibo ZhuStealth startup