Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
- Matthias GrundmannGoogle ResearchVerified email at google.com
- Tingbo HouMetaVerified email at meta.com
- Shobha VasudevanProfessor of Computer Engineering, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Artsiom AblavatskiGoogle ResearcgVerified email at google.com
- Mahdi FazeliAssociate Professor, School of Information Technology, Halmstad UniversityVerified email at hh.se
- Hossein AsadiProfessor, Department of Computer Engineering, Sharif University of TechnologyVerified email at sharif.edu
- Jayanand Asok KumarUniversity of Illinois at Urbana-Champaign, Qualcomm AtherosVerified email at qca.qualcomm.com
- Mehdi B. TahooriProfessor of Computer Science, Karlsruhe Institute of Technology, GermanyVerified email at kit.edu
- Genzhi YeSoftware Engineer, Google Inc.Verified email at google.com
- Chenjie GuDeepMindVerified email at google.com
- Eli ChiproutIntel Corporation Strategic CAD labsVerified email at intel.com
- HV PoorMichael Henry Strater University Professor, Princeton UniversityVerified email at princeton.edu
- Rasoul EtesamiUniversity of Illinois Urbana-ChampaignVerified email at illinois.edu
- Nahid Farhady GhalatySecurity ML EngineerVerified email at vt.edu