Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- William EberleTennessee Technological UniversityVerified email at tntech.edu
- Mohiuddin AhmedSenior Lecturer of Computing & Security at Edith Cowan University, IEEE Senior MemberVerified email at ecu.edu.au
- Ambareen SirajProfessor of Computer Science, Tennessee Tech UniversityVerified email at tntech.edu
- Ruhul Amin, PhDComputer and Information Sciences, Fordham UniversityVerified email at fordham.edu
- Awny AlnusairProfessor at Indiana UniversityVerified email at iu.edu
- Hong LiuIndiana University KokomoVerified email at iu.edu
- Chen ZhongThe University of TampaVerified email at ut.edu
- Robert A. BridgesMathematician & Innovation Leader, AI SwedenVerified email at ai.se
- Syeda Jannatus SabaStony Brook University, NYVerified email at stonybrook.edu
- Biddut Sarker BijoyCS PhD Student, Stony Brook UniversityVerified email at stonybrook.edu
- Alfred KalyanapuProfessor, Tennessee Tech UniversityVerified email at TnTech.edu
- Shih-Chieh KaoOak Ridge National LaboratoryVerified email at ornl.gov
- Sudershan GangradeOak Ridge National LaboratoryVerified email at ornl.gov
- Tanzeem Bin NoorM.Sc, Computer Science, University of ManitobaVerified email at cs.umanitoba.ca
- Ramakrishnan KannanOak Ridge National LaboratoryVerified email at ornl.gov
- Md Mosharaf HossainApplied Scientist, AmazonVerified email at amazon.com
- Benjamin L PrestonRAND CorporationVerified email at rand.org
- Sheikh K GhafoorTennessee Technological University
- Guenevere (Qian) ChenAssociate Professor, Electrical and Computer Engineering, The University of Texas at San AntonioVerified email at utsa.edu