Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Tilman WolfProfessor of Electrical and Computer Engineering, University of Massachusetts AmherstVerified email at umass.edu
- Sriram NatarajanGoogle Inc.Verified email at google.com
- Srini SeetharamanVMwareVerified email at vmware.com
- Deepak UnnikrishnanNVIDIA, University of Massachusetts, AmherstVerified email at ecs.umass.edu
- Lixin GaoDistinguished Professor, Univ. of MassachusettsVerified email at ecs.umass.edu
- Ramakrishna VadlamaniQualcomm Technologies IncVerified email at qti.qualcomm.com
- Russell TessierUniversity of MassachusettsVerified email at umass.edu
- Y. Sinan HanayASML and Luxoft (DXC)Verified email at asml.com
- Shachi H. KumarResearch Scientist, Intel LabsVerified email at intel.com
- Xinming ChenUniversity of Massachusetts AmherstVerified email at google.com
- Hao CaiByteDance Ltd.Verified email at bytedance.com
- Jeremy Buhlerprofessor of computer science, Washington universityVerified email at wustl.edu
- Anthony M CabreraResearch Scientist, Oak Ridge National LaboratoryVerified email at ornl.gov
- Roger ChamberlainProfessor of Computer Science and Engineering, Washington UniversityVerified email at wustl.edu
- Clayton FaberPhD Student, Washington UniversityVerified email at wustl.edu
- Kekai HuPrincipal Security Researcher, IntelVerified email at intel.com
- Shlomo ZilbersteinProfessor of Computer Science, University of Massachusetts AmherstVerified email at cs.umass.edu
- Richard G. FreedmanPh.D. Student, University of Massachusetts AmherstVerified email at cs.umass.edu
- Harumi Kunoprinciple research engineer, Hewlett Packard LabsVerified email at hpe.com
- Sharad SinghalHewlett Packard EnterpriseVerified email at hpe.com