Get my own profile
Public access
View all35 articles
1 article
available
not available
Based on funding mandates
Co-authors
Prashant ShenoyDistinguished Professor, College of Information and Computer Sciences, University of MassachusettsVerified email at cs.umass.edu
K. K. RamakrishnanDistinguished Professor of Computer Science and Engineering, University of California, RiversideVerified email at cs.ucr.edu
Jinho HwangMetaVerified email at meta.com
Guyue (Grace) LiuPeking UniversityVerified email at pku.edu.cn
Jacobus (Kobus) Van der MerweAssociate Professor, School of Computing, University of UtahVerified email at cs.utah.edu
Arun VenkataramaniProfessor, Computer Science, University of Massachusetts AmherstVerified email at cs.umass.edu
Ludmila (Lucy) CherkasovaPrincipal Researcher, ARM Research (also known as Lucy Cherkasova)Verified email at arm.com
Emmanuel CecchetSenior Research Scientist, University of Massachusetts AmherstVerified email at cs.umass.edu
Wade TrappeProfessor, Electrical and Computer Engineering, WINLAB, Rutgers UniversityVerified email at winlab.rutgers.edu
Yanyong ZhangUniversity of Science and Technology of China ; Rutgers University (Adjunct Visiting Professor)Verified email at ustc.edu.cn
Wenyuan XuProfessor, IEEE Fellow, Zhejiang University, College of EEVerified email at zju.edu.cn
Sameer G KulkarniIIT GandhinagarVerified email at usc.edu
Peter DesnoyersAssociate Professor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Sunny RajasekaranSecurity Researcher, Intel CorporationVerified email at gwu.edu
H. Howie HuangGraphLab, George Washington UniversityVerified email at gwu.edu
Shriram RajagopalanGoogleVerified email at google.com
Neel ShahVerified email at shah7.com
rahul singhKeepTruckin Inc.Verified email at keeptruckin.com
Ali MohammadkhanUniversity of California Riverside (UCR)Verified email at ucr.edu
Alain TchanaAssociate Professor, INPTVerified email at enseeiht.fr