Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Sean SmithProfessor of Computer Science, Dartmouth CollegeVerified email at cs.dartmouth.edu
- Charles PalmerIBMVerified email at us.ibm.com
- Pankaj RohatgiGoogleVerified email at google.com
- Vincenzo DiLuoffoWPIVerified email at wpi.edu
- Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
- Josyula Ramachandra RaoIBM ResearchVerified email at us.ibm.com
- Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
- Hani JamjoomPrincipal Research Scientist and Manager, IBM Watson Research, New YorkVerified email at us.ibm.com
- Ronald PerezIntelVerified email at intel.com
- Michael McIntoshGoogleVerified email at acm.org
- Ashish KunduHead of Cybersecurity Research, Cisco ResearchVerified email at acm.org
- Vanessa MicheliniFormer IBM Distinguished EngineerVerified email at natera.com
- Renato Luiz de Freitas CunhaSoftware Engineer, Microsoft ResearchVerified email at acm.org
- Mehmet KayaalpIntelVerified email at intel.com
- Hugo KrawczykAmazon Web ServicesVerified email at amazon.com
- Hubertus FrankeDistinguished Research Scientist, IBM ResearchVerified email at us.ibm.com