Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jennifer RexfordProfessor of Computer Science, Princeton UniversityEmail verificata su cs.princeton.edu
- Jacobus (Kobus) Van der MerweAssociate Professor, School of Computing, University of UtahEmail verificata su cs.utah.edu
- Jia WangIEEE Fellow, Lead Inventive Scientist, AT&T Labs - ResearchEmail verificata su att.com
- Ajay MahimkarLead Inventive Scientist 1, AT&T Labs - ResearchEmail verificata su att.com
- Yin Zhang (章寅)The University of Texas at AustinEmail verificata su cs.utexas.edu
- Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoEmail verificata su uchicago.edu
- Bilal AnwerAT&T Labs ResearchEmail verificata su research.att.com
- Renata TeixeiraNetflixEmail verificata su netflix.com
- Matthew RoughanSchool of Mathematical Sciences, University of AdelaideEmail verificata su adelaide.edu.au
- Matthew CaesarProfessor of Computer Science, University of IllinoisEmail verificata su illinois.edu
- Sue MoonSchool of Computing, KAISTEmail verificata su kaist.edu
- Meeyoung ChaMax Planck Institute for Security and Privacy (MPI-SP) and KAISTEmail verificata su mpi-sp.org
- Dan PeiAssociate Professor of Computer Science, Tsinghua UniversityEmail verificata su tsinghua.edu.cn
- Mukul GoyalUniversity of Wisconsin MilwaukeeEmail verificata su uwm.edu
- Rohit DubeIndependent ConsultantEmail verificata su berkeley.edu
- Ruichuan ChenDistinguished Member of Technical Staff @ Bell LabsEmail verificata su ruichuan.org
- Hari BalakrishnanMITEmail verificata su csail.mit.edu
- Bean, NigelUniversity of AdelaideEmail verificata su adelaide.edu.au
- Alex C. SnoerenUC San DiegoEmail verificata su cs.ucsd.edu
- Vishwas ManralMcAfee CloudEmail verificata su mcafee.com