Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mark D. HillUniversity of Wisconsin-Madison Professor EmeritusEmail verificata su cs.wisc.edu
- David A. WoodUniversity of Wisconsin, MadisonEmail verificata su cs.wisc.edu
- Daniel J. SorinProfessor of ECE and Computer Science, Duke UniversityEmail verificata su ee.duke.edu
- Steve ZdancewicProfessor of Computer and Information Science, University of PennsylvaniaEmail verificata su cis.upenn.edu
- Santosh NagarakatteProfessor of Computer Science at Rutgers UniversityEmail verificata su cs.rutgers.edu
- Colin BlundellGoogleEmail verificata su google.com
- Arun RaghavanOracle LabsEmail verificata su oracle.com
- Thomas F. WenischProf. of CSE, University of MichiganEmail verificata su umich.edu
- Jianzhou ZhaoEmail verificata su cis.upenn.edu
- Alaa R. AlameldeenSimon Fraser UniversityEmail verificata su cs.sfu.ca
- Sela Mador-HaimComputer Information Science, University of PennsylvaniaEmail verificata su xcitedb.com
- Abhishek UdupaMicrosoft ResearchEmail verificata su microsoft.com
- Kevin PipeUniversity of MichiganEmail verificata su umich.edu
- Michael R. MartyGoogleEmail verificata su google.com
- E Christopher LewisVMware, Inc.Email verificata su vmware.com
- Joseph DeviettiAssistant Professor of Computer & Information Science, University of PennsylvaniaEmail verificata su cis.upenn.edu
- Sebastian BurckhardtMicrosoft ResearchEmail verificata su microsoft.com
- Laurel EmurianStudent, University of PennsylvaniaEmail verificata su seas.upenn.edu
- Amir RothUS DOEEmail verificata su ee.doe.gov
- Jyotirmoy V. DeshmukhAssociate Professor, University of Southern CaliforniaEmail verificata su usc.edu