Crea il mio profilo
Accesso pubblico
Visualizza tutto69 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Thai LeAssistant Professor, University of MississippiEmail verificata su olemiss.edu
- Suhang WangPennsylvania State UniversityEmail verificata su psu.edu
- Seog-Chan OhStaff Research at General Motors R&DEmail verificata su gm.com
- Murali ManiUniversity of Michigan-FlintEmail verificata su umich.edu
- Kai ShuAssistant Professor of Computer Science, Illinois Institute of TechnologyEmail verificata su iit.edu
- Huan LiuRegents Professor, Arizona State UniversityEmail verificata su asu.edu
- Bo LuoProfessor, The University of KansasEmail verificata su ku.edu
- Soundar KumaraAllen, E & Allen, M., Pearce Professor of Industrial Engeering, Professor of Computer Science andEmail verificata su psu.edu
- Byung-Won OnDepartment of Software Convergence Engineering, Kunsan National UniversityEmail verificata su kunsan.ac.kr
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Limeng CuiAmazonEmail verificata su amazon.com
- Jaewoo Kang (강재우)Dept of Computer Science and Engineering, Korea UniversityEmail verificata su korea.ac.kr
- Adaku UchenduMIT Lincoln LaboratoryEmail verificata su ll.mit.edu
- Min-Yen Kan (靳民彦)Associate Professor, National University of SingaporeEmail verificata su comp.nus.edu.sg
- Kyungsik HanHanyang UniversityEmail verificata su hanyang.ac.kr
- Jongwuk LeeSungkyunkwan University, KoreaEmail verificata su skku.edu
- Su YanApple Inc.Email verificata su apple.com
- Sang-Wook KimProfessor of Computer Science and Engineering, Hanyang UniversityEmail verificata su hanyang.ac.kr
- Prasenjit MitraVisiting Professor, L3S Research Ctr., Leibniz Universitat Hannover & Prof. of IST, Penn State Univ.Email verificata su psu.edu
- HAESEUNG SEOThe Pennsylvania State UniversityEmail verificata su psu.edu