Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David JensenProfessor of Computer Science, University of Massachusetts AmherstVerified email at cs.umass.edu
Prashant ShenoyDistinguished Professor, College of Information and Computer Sciences, University of MassachusettsVerified email at cs.umass.edu
Kaleigh ClaryMS/PhD Student, University of Massachusetts, AmherstVerified email at cs.umass.edu
Michael LittmanBrown UniversityVerified email at brown.edu
Emma ToschResearcher, Northeastern UniversityVerified email at northeastern.edu
Sam WittyResearch Scientist - Basis Research InstituteVerified email at basis.ai
Teresa M. HarrisonProfessor of Communication, University at AlbanyVerified email at albany.edu
S. S. RaviResearch Professor, Biocomplexity Institute, University of VirginiaVerified email at virginia.edu
Catherine Dumas PhDVisiting Assistant Professor, SUNY AlbanyVerified email at albany.edu
Tim FakeOptiv Cybersecurity, University at AlbanyVerified email at albany.edu
Jun Ki LeeAssociate Research Professor, Seoul National University AI InstituteVerified email at snu.ac.kr
Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & NSF CHORUS; PurdueVerified email at purdue.edu
Ran XuPurdue UniversityVerified email at purdue.edu
Tarek AbdelzaherUniversity of IllinoisVerified email at illinois.edu
Ramesh GovindanProfessor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
Nic DePaulaSUNY Polytechnic InstituteVerified email at sunypoly.edu
William MayAtmospheric Sciences Research CenterVerified email at albany.edu
Vivek K. SinghRutgers UniversityVerified email at mit.edu
Huseyin OktayUniversity of Massachusetts, AmherstVerified email at cs.umass.edu
Ritwik SinhaAdobe ResearchVerified email at adobe.com