Get my own profile
Public access
View all89 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Subrata MitraAdobe ResearchVerified email at adobe.com
Ness ShroffDepartment of ECE and CSE, The Ohio State UniversityVerified email at osu.edu
Rajesh PantaAT&T Labs - ResearchVerified email at research.att.com
Ignacio LagunaLawrence Livermore National LaboratoryVerified email at llnl.gov
Shreyas SundaramMarie Gordon Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
Amiya K MajiPurdue UniversityVerified email at purdue.edu
Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
Milind KulkarniAssociate Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
Folker MeyerUniversity of Duisburg-Essen; University Hospital EssenVerified email at uni-due.de
Eugene H. SpaffordProfessor, Purdue UniversityVerified email at purdue.edu
Rudolf EigenmannProfessor of Electrical and Computer Engineering, University of DelawareVerified email at udel.edu
Todd GamblinLawrence Livermore National LaboratoryVerified email at llnl.gov
Gaspar Modelo-HowardData Scientist (Security), Palo Alto NetworksVerified email at acm.org
Martin SchulzTechnical University of MunichVerified email at in.tum.de
Donghoon ShinProofpointVerified email at proofpoint.com
Tanzima IslamAssistant Professor, Texas State UniversityVerified email at txstate.edu
Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Paulo Esteves-VerissimoProfessor of Computer Science, RC3, CEMSE -- KAUSTVerified email at kaust.edu.sa
Y. Charlie HuMichael and Katherine Birck Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
James JoshiProfessor, SCI, University of Pittsburgh; Expert NSF-TIPVerified email at pitt.edu