Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
- David JensenProfessor of Computer Science, University of Massachusetts AmherstVerified email at cs.umass.edu
- Prashant ShenoyDistinguished Professor, College of Information and Computer Sciences, University of MassachusettsVerified email at cs.umass.edu
- Kaleigh ClaryMS/PhD Student, University of Massachusetts, AmherstVerified email at cs.umass.edu
- Michael LittmanBrown UniversityVerified email at brown.edu
- Emma ToschResearcher, Northeastern UniversityVerified email at northeastern.edu
- Sam WittyResearch Scientist - Basis Research InstituteVerified email at basis.ai
- Teresa M. HarrisonProfessor of Communication, University at AlbanyVerified email at albany.edu
- S. S. RaviResearch Professor, Biocomplexity Institute, University of VirginiaVerified email at virginia.edu
- Catherine Dumas PhDAssistant Professor, Simmons University, Boston UniversityVerified email at simmons.edu
- Tim FakeOptiv Cybersecurity, University at AlbanyVerified email at albany.edu
- Jun Ki LeeResearch Assistant, Brown UniversityVerified email at brown.edu
- Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & CRISP; Purdue UniversityVerified email at purdue.edu
- Ran XuPurdue UniversityVerified email at purdue.edu
- Tarek AbdelzaherUniversity of IllinoisVerified email at illinois.edu
- Ramesh GovindanProfessor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
- Vivek K. SinghRutgers UniversityVerified email at mit.edu
- Nic DePaulaWayne State UniversityVerified email at wayne.edu
- William MayAtmospheric Sciences Research CenterVerified email at albany.edu
- Huseyin OktayUniversity of Massachusetts, AmherstVerified email at cs.umass.edu
- Ritwik SinhaAdobe ResearchVerified email at adobe.com