Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Petros ZerfosIBM T.J. Watson Research CenterVerified email at us.ibm.com
- Author:"szymanski b"Claire and Roland Schmitt Distinguished Professor of Computer Science, Rensselaer PolytechnicVerified email at rpi.edu
- Christopher GibsonIBM Research, IBM UKVerified email at uk.ibm.com
- Dominic HarriesIBMVerified email at uk.ibm.com
- Chatschik BisdikianIBM ResearchVerified email at us.ibm.com
- Sahin Cem GeyikFacebookVerified email at fb.com
- Konstantin KuzminSr. Lecturer, Rensselaer Polytechnic Institute (RPI), Department of Computer ScienceVerified email at cs.rpi.edu
- Sanmay DasProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu
- Jorge LoboICREA - Universitat Pompeu FabraVerified email at upf.edu
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
- Meenal ChhabraStudent at Rensselaer Polytechnic InstituteVerified email at rpi.edu
- Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterVerified email at us.ibm.com
- Henry MarkramProfessor of Neuroscience, EPFLVerified email at epfl.ch
- John IbbotsonIBM UK LtdVerified email at uk.ibm.com
- Geeth de MelResearch Staff MemberVerified email at uk.ibm.com