Crea il mio profilo
Accesso pubblico
Visualizza tutto59 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ee-Peng LimSingapore Management UniversityEmail verificata su smu.edu.sg
- Jiawei HanAbel Bliss Professor of Computer Science, University of IllinoisEmail verificata su cs.uiuc.edu
- Xifeng YanProfessor, Computer Science, Univ. of California at Santa BarbaraEmail verificata su cs.ucsb.edu
- Philip S. YuProfessor of Computer Science, University of Illinons at ChicagoEmail verificata su cs.uic.edu
- Minghui QiuAlibaba GroupEmail verificata su smu.edu.sg
- Jing JiangSchool of Computing, ANU; School of Computing and Information Systems, SMUEmail verificata su smu.edu.sg
- David LoProfessor of Computer Science, Singapore Management UniversityEmail verificata su smu.edu.sg
- Siyuan LiuSmeal College of Business, Pennsylvania State UniversityEmail verificata su psu.edu
- GOTTIPATI SwapnaAssociate Professor of Information Systems, Singapore Managment UniversityEmail verificata su smu.edu.sg
- Chen ChenGoogle Inc.Email verificata su google.com
- Liu YangGoogle ResearchEmail verificata su google.com
- Wei GongPhd candidate, Singapore Management UniversityEmail verificata su smu.edu.sg
- Ke WangProfessor of Computing Science, Simon Fraser UniversityEmail verificata su cs.sfu.ca
- Su Mon KyweSecurity ArchitectEmail verificata su sc.com
- Shuhui Wang(王树徽)Professor, Institute of Computing Technology, Chinese Academy of SciencesEmail verificata su ict.ac.cn
- Palakorn Achananuparp (Aek)School of Computing and Information Systems, Singapore Management UniversityEmail verificata su smu.edu.sg
- Tuan-Anh HoangRMIT Vietnam UniversityEmail verificata su rmit.edu.vn
- Jinbo ZhangPeking UniversityEmail verificata su pku.edu.cn
- Ramayya KrishnanCarnegie Mellon UniversityEmail verificata su cmu.edu
- Bolin DingAlibaba GroupEmail verificata su alibaba-inc.com