Get my own profile
Public access
View all31 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Richard MortierCambridge University Computer LaboratoryVerified email at cl.cam.ac.ukHamed HaddadiImperial College London / Brave SoftwareVerified email at imperial.ac.uk
Angelo FeraudoPost Doctoral Researcher, Northeastern UniversityVerified email at northeastern.edu
Diana Andreea PopescuUniversity of Cambridge, Department of Computer Science and TechnologyVerified email at cl.cam.ac.uk
Urmish ThakkerDeep Learning Research, SambaNova SystemsVerified email at wisc.edu
Danilo PauSTMicroelectronics SrlVerified email at st.com
David KanterReal World InsightsVerified email at realworldtech.com
Colby BanburySenior Researcher, MicrosoftVerified email at g.harvard.edu
Vijay Janapa ReddiHarvard UniversityVerified email at eecs.harvard.edu
Paolo BellavistaFull Professor, University of BolognaVerified email at unibo.it
Julie A. McCannImperial College LondonVerified email at imperial.ac.uk
Derek McAuleyUniversity of NottinghamVerified email at nottingham.ac.uk
John DarlingtonProfessor of Computing, Imperial College LondonVerified email at imperial.ac.ukJon CrowcroftUniversity of CambridgeVerified email at cl.cam.ac.uk
Professor Andy CrabtreeUniversity of NottinghamVerified email at nottingham.ac.uk
Chris GreenhalghProfessor of Computer Science, University of NottinghamVerified email at nottingham.ac.uk
Dr Yousef AmarCTO, Artanis LtdVerified email at qmul.ac.uk
Vassilios G. VassilakisAssociate Professor in Cyber Security, University of YorkVerified email at cl.cam.ac.uk
Anton LokhmotovFounder, KRAIVerified email at krai.ai
David PattersonProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu