Get my own profile
Public access
View all88 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Subrata MitraAdobe ResearchVerified email at adobe.com
- Ness ShroffDepartment of ECE and CSE, The Ohio State UniversityVerified email at osu.edu
- Rajesh PantaAT&T Labs - ResearchVerified email at research.att.com
- Ignacio LagunaLawrence Livermore National LaboratoryVerified email at llnl.gov
- Shreyas SundaramMarie Gordon Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
- Amiya K MajiPurdue UniversityVerified email at purdue.edu
- Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
- Milind KulkarniAssociate Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
- Folker MeyerUniversity of Duisburg-Essen; University Hospital EssenVerified email at uni-due.de
- Eugene H. SpaffordProfessor, Purdue UniversityVerified email at purdue.edu
- Rudolf EigenmannProfessor of Electrical and Computer Engineering, University of DelawareVerified email at udel.edu
- Todd GamblinLawrence Livermore National LaboratoryVerified email at llnl.gov
- Gaspar Modelo-HowardData Scientist (Security), Palo Alto NetworksVerified email at acm.org
- Martin SchulzTechnical University of MunichVerified email at in.tum.de
- Donghoon ShinProofpointVerified email at proofpoint.com
- Tanzima IslamAssistant Professor, Texas State UniversityVerified email at txstate.edu
- Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
- Paulo Esteves-VerissimoProfessor of Computer Science, RC3, CEMSE -- KAUSTVerified email at kaust.edu.sa
- Y. Charlie HuMichael and Katherine Birck Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
- James JoshiProfessor, SCI, University of Pittsburgh; Expert NSF-TIPVerified email at pitt.edu