Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Petros ZerfosIBM T.J. Watson Research CenterVerified email at us.ibm.com
Boleslaw SzymanskiClaire and Roland Schmitt Distinguished Professor, Rensselaer Polytechnic Institute, Troy NY 12180Verified email at rpi.edu
Christopher GibsonIBM Research, IBM UKVerified email at uk.ibm.com
Dominic HarriesIBMVerified email at uk.ibm.com
Chatschik BisdikianIBM ResearchVerified email at us.ibm.com
Sahin Cem GeyikFacebookVerified email at fb.com
Konstantin KuzminLecturer, Rensselaer Polytechnic Institute (RPI), Department of Computer ScienceVerified email at cs.rpi.edu
Sanmay DasProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu
Jorge LoboICREA - Universitat Pompeu FabraVerified email at upf.edu
Alun PreeceCardiff University - Crime & Security Research InstituteVerified email at cardiff.ac.uk
Meenal ChhabraStudent at Rensselaer Polytechnic InstituteVerified email at rpi.edu
Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterVerified email at us.ibm.com
Henry MarkramProfessor of Neuroscience, EPFLVerified email at epfl.ch
John IbbotsonIBM UK LtdVerified email at uk.ibm.com
Geeth de MelResearch Staff MemberVerified email at uk.ibm.com