Get my own profile
Public access
View all10 articles
9 articles
available
not available
Based on funding mandates
Co-authors
KIMON P VALAVANISUniversity of DenverVerified email at du.edu
Alexander L WolfDean of Engineering, University of California, Santa CruzVerified email at member.acm.org
Nikolaos VitzilaiosAssociate Professor, University of South CarolinaVerified email at sc.edu
Alessandro RizzoAssociate Professor at Politecnico di Torino, ItalyVerified email at polito.it
Goncalo MartinsUniversity of Denver (USA)Verified email at du.edu
PRANITH CHANDER SAKAM.Sc. University of denverVerified email at hummingbirdscientific.comMike MichailidisMathWorks, Inc.Verified email at mathworks.com
Mohammed AghaBMW Group - Alten ConsultingVerified email at alten-consulting.de
Jessica AlvarengaUniversity of DenverVerified email at du.edu
Junya MichananChulachomklao Royal Military Academy (CRMA)Verified email at crma.ac.th
Kenneth M. AndersonUniversity of ColoradoVerified email at cs.colorado.edu
Vahid YousefzadehTexas InstrumentsVerified email at ti.com
Daniele SartoriShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Chris GauthierDickeyAssociate Professor of Computer Science, University of DenverVerified email at cs.du.edu
Nathan S. EvansAssociate Teaching Professor/Faculty Directory Cybersecurity, University of DenverVerified email at du.eduHai LinElectrical Engineering, University of Notre DameVerified email at nd.edu
P J AntsaklisProfessor of Electrical Engineering, University of Notre DameVerified email at nd.edu
Jin DaiMomenta USA Inc.Verified email at alumni.nd.edu
Christian GrothoffBern University of Applied SciencesVerified email at grothoff.org
Nathan SturtevantUniversity of Alberta, Alberta Machine Intelligence Institute (Amii)Verified email at ualberta.ca