Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Pankaj RohatgiGoogleVerified email at google.com
- Douglas SchalesSTSM, IBM ResearchVerified email at us.ibm.com
- Marc Ph. StoecklinIBM ResearchVerified email at zurich.ibm.com
- Dakshi AgrawalIBM Fellow, IBMVerified email at us.ibm.com
- Mihai ChristodorescuGoogleVerified email at christodorescu.org
- Ian MolloyIBM ResearchVerified email at us.ibm.com
- Xin HuIBM T.J. Watson Research Center at Yorktown Heights, NYVerified email at us.ibm.com
- Jiyong JangResearch Scientist, IBM ResearchVerified email at us.ibm.com
- Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
- Dhilung KiratResearch Scientist, IBM ResearchVerified email at us.ibm.com
- Chung-Sheng LiTaiwan Semiconductor Manufacturing Company LimitedVerified email at ieee.org
- Ashish KunduHead of Cybersecurity Research, Cisco ResearchVerified email at acm.org
- Hubertus FrankeDistinguished Research Scientist, IBM ResearchVerified email at us.ibm.com
- Pradeep DubeyIntel CorporationVerified email at intel.com
- Atri RudraKatherine Johnson Chair in AI, Professor, CSE, University at BuffaloVerified email at buffalo.edu
- Rangachari AnandResearch Staff Member, IBMVerified email at us.ibm.com
- Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
- Olivier VerscheureSwiss Data Science Center @ EPFL & ETH ZurichVerified email at datascience.ch
- Lisa AminiIBM ResearchVerified email at us.ibm.com
- Srinivasan ParthasarathyProfessor of Computer Science and Engineering, The Ohio State UniversityVerified email at cse.ohio-state.edu