Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Omer TrippAmazonVerified email at google.com
Takaaki TateishiIBM Research - TokyoVerified email at jp.ibm.com
Larry KovedFormerly at IBM T.J. Watson Research CenterVerified email at alumni.union.edu
Pietro FerraraAssistant Professor, Università Ca' Foscari di Venezia, ItalyVerified email at unive.it
Julian DolbyIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Paolina CentonzeProfessor of Computer Science, Iona College, New Rochelle, New YorkVerified email at iona.edu
Shay ArtziAmazonVerified email at amazon.com
Paul CastroResearch Staff Member, IBM ResearchVerified email at us.ibm.com
Stephen FinkIBMVerified email at us.ibm.com
Shaohan HuJPMorgan Chase & Co.Verified email at jpmchase.com
Chun-Fu (Richard) ChenJPMorgan Chase & Co.Verified email at jpmchase.com
Jay M. GambettaIBM QuantumVerified email at us.ibm.com
Manu SridharanProfessor, Computer Science and Engineering, University of California, RiversideVerified email at sridharan.net
Roee HayVulnerability researcherVerified email at securityresear.ch
Frank TipProfessor, Northeastern UniversityVerified email at northeastern.edu
Liu PengRSM@IBM ResearchVerified email at us.ibm.com
Antonio MezzacapoIBM Quantum - Watson Research CenterVerified email at us.ibm.com
Arthur G RattewUniversity of OxfordVerified email at materials.ox.ac.uk
Eran YahavTechnion, IsraelVerified email at cs.technion.ac.il
Dylan HermanJPMorgan Chase & CoVerified email at jpmchase.com