Get my own profile
Public access
View all8 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Chenglu JinCWI AmsterdamVerified email at cwi.nl
- Omer KhanProfessor, University of ConnecticutVerified email at uconn.edu
- Masab AhmadIntelVerified email at uconn.edu
- Ling RenAssistant Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Dan AlistarhIST AustriaVerified email at ist.ac.at
- Albert KwonMITVerified email at mit.edu
- Xiangyao YuUniversity of Wisconsin - MadisonVerified email at cs.wisc.edu
- Christopher W. FletcherUniversity of California, BerkeleyVerified email at berkeley.edu
- William HasenplaughD. E. Shaw ResearchVerified email at mit.edu
- Farrukh HijazMeta's Reality LabsVerified email at uconn.edu
- Ilia Lebedevgradient.tech, MITVerified email at gradient.tech
- Norbert WehnUniversity of KaiserslauternVerified email at eit.uni-kl.de
- John MageeClark UniversityVerified email at clarku.edu
- Marten van DijkComputer Security, CWI, Amsterdam; Vrije Universiteit van Amsterdam; ECE Department UConn