Get my own profile
Public access
View all6 articles
15 articles
available
not available
Based on funding mandates
Co-authors
Anna NagurneyEugene M. Isenberg Chair in Integrative Studies, Isenberg School of Management, University ofVerified email at isenberg.umass.edu
Ning WengProfessor of Electrical and Computer Engineering, Southern Illinois University CarbondaleVerified email at siu.edu
Xin HuangSenior Principal Engineer at ComcastVerified email at cable.comcast.com
Abhishek DwarakiWashington University in St. LouisVerified email at wustl.edu
Danai ChasakiVillanova UniVerified email at villanova.edu
Jonathan TurnerSenior Professor of Computer Science, Washington University in St. LouisVerified email at wustl.edu
Sriram NatarajanGoogle Inc.Verified email at google.com
Kenneth L. CalvertProfessor of Computer Science, University of KentuckyVerified email at netlab.uky.edu
Ilya BaldinDirector, Network Research and Infrastructure, RENCI/UNC Chapel HillVerified email at renci.org
Wayne BurlesonUniversity of Massachusetts AmherstVerified email at ecs.umass.edu
George N. RouskasAlumni Distinguished Graduate Professor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Rudra DuttaProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Yan CaiMicrosoftVerified email at microsoft.com
Xinming ChenUniversity of Massachusetts AmherstVerified email at google.com
Bernhard PlattnerProfessor of Computer Engineering, ETH ZurichVerified email at ethz.ch
Kekai HuPrincipal Security Researcher, IntelVerified email at intel.com
Y. Sinan HanayASML and Luxoft (DXC)Verified email at asml.com
Arman PouraghilyRTL Design Engineer, AppleVerified email at apple.com
Shiv GanapathyGoogle, IncVerified email at google.com
Harikrishnan ChandrikakuttyMicrosoft, University of Massachusetts AmherstVerified email at microsoft.com
Follow
Tilman Wolf
Professor of Electrical and Computer Engineering, University of Massachusetts Amherst
Verified email at umass.edu - Homepage