Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Thomas E. KellerUniversity of South FloridaVerified email at usf.edu
- Teresa M. HarrisonProfessor of Communication, University at AlbanyVerified email at albany.edu
- Nic DePaulaSUNY Polytechnic InstituteVerified email at sunypoly.edu
- Catherine Dumas PhDAssistant Professor, SUNY AlbanyVerified email at albany.edu
- Daniel LaMannaStudent of Computer Science, University at AlbanyVerified email at albany.edu
- Ryan ScharfVerified email at mail.usf.edu
- Ozlem UzunerGeorge Mason UniversityVerified email at gmu.edu
- Fatima K. Espinoza VasquezUniversity of KentuckyVerified email at uky.edu
- Feng ChenDepartment of Computer Science, UT DallasVerified email at utdallas.edu
- S. S. RaviResearch Professor, Biocomplexity Institute, University of VirginiaVerified email at virginia.edu
- Tim FakeOptiv Cybersecurity, University at AlbanyVerified email at albany.edu
- James E. Andrews, Ph.D.Professor, University of South Florida, School of InformationVerified email at usf.edu
- Luis Felipe Luna-ReyesProfessor of Public Administration and Policy (University at Albany)Verified email at albany.edu
- Muhammad Abdul-MageedThe University of British ColumbiaVerified email at ubc.ca
- Abebe RorissaProfessor & Director, School of Information SciencesVerified email at tennessee.edu
- Lisa FedererNational Library of MedicineVerified email at nih.gov
- Satya KatragaddaSr AI/ML Engineer, Genesys Cloud Solutions IncVerified email at genesys.com
- William MayAtmospheric Sciences Research CenterVerified email at albany.edu
- Jisue LeeAssociate Professor, Chonnam National University, South KoreaVerified email at jnu.ac.kr
- Soon Ae ChunProfessor of IS/Informatics, Comp Sci & Data Sci, CUNY, College of Staten Island and Graduate CenterVerified email at csi.cuny.edu
Follow