Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Tilman WolfProfessor of Electrical and Computer Engineering, University of Massachusetts AmherstVerified email at umass.edu
Srini SeetharamanVMwareVerified email at vmware.com
Deepak UnnikrishnanNVIDIA, University of Massachusetts, AmherstVerified email at ecs.umass.edu
Lixin GaoDistinguished Professor, Univ. of MassachusettsVerified email at ecs.umass.edu
Ramakrishna VadlamaniQualcomm Technologies IncVerified email at qti.qualcomm.comRussell TessierUniversity of MassachusettsVerified email at umass.edu
Y. Sinan HanayASML and Luxoft (DXC)Verified email at asml.com
Shachi H. KumarResearch Scientist, Intel LabsVerified email at intel.com
Jeremy Buhlerprofessor of computer science, Washington universityVerified email at wustl.eduAnthony M CabreraResearch Scientist, Oak Ridge National LaboratoryVerified email at ornl.gov
Roger ChamberlainProfessor of Computer Science and Engineering, Washington UniversityVerified email at wustl.edu
Clayton FaberPhD Student, Washington UniversityVerified email at wustl.edu
Harumi Kunoprinciple research engineer, Hewlett Packard LabsVerified email at hpe.com
Clarete Riana CrastaHewlett Packard EnterpriseVerified email at hpe.comXinming ChenUniversity of Massachusetts AmherstVerified email at google.com
Hao CaiByteDance Ltd.Verified email at bytedance.com
Kekai HuPrincipal Security Researcher, IntelVerified email at intel.comShlomo ZilbersteinProfessor of Computer Science, University of Massachusetts AmherstVerified email at cs.umass.edu
Richard G. FreedmanPh.D. Student, University of Massachusetts AmherstVerified email at cs.umass.edu
Sharad SinghalHewlett Packard EnterpriseVerified email at hpe.com