Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Petros ZerfosIBM T.J. Watson Research CenterVerified email at us.ibm.com
Dominic HarriesIBMVerified email at uk.ibm.com
Chatschik BisdikianIBM ResearchVerified email at us.ibm.com
Author:"szymanski b"Claire and Roland Schmitt Distinguished Professor of Computer Science, Rensselaer PolytechnicVerified email at rpi.edu
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
John IbbotsonIBM UK LtdVerified email at uk.ibm.com
Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKVerified email at abdn.ac.uk
Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
Hosam RowaihyAssistant Professor of Computer Engineering, King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
Amotz Bar-NoyProfessor of Computer Science, City University of New York (CUNY)Verified email at sci.brooklyn.cuny.edu
Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
Mario Gómez MartínezAssociate Professor (UPV)Verified email at dsic.upv.es
Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneVerified email at capitalone.com
Gene WhippsJHU/APLVerified email at jhuapl.edu
Sahin Cem GeyikFacebookVerified email at fb.com
Dave BrainesIBM Research, UKVerified email at uk.ibm.com
Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Federico CeruttiFull Professor, University of Brescia, ItalyVerified email at unibs.it
Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterVerified email at us.ibm.com