Get my own profile
Public access
View all33 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Thomas EisenbarthUniversity of LübeckVerified email at uni-luebeck.de
- Yarkin DorozAssistant Teaching ProfessorVerified email at wpi.edu
- Gorka IrazoquiWorcester Polytechnic InstituteVerified email at wpi.edu
- Mehmet Sinan InciSecurity ResearcherVerified email at nvidia.com
- Daniel MoghimiSenior Research Scientist, GoogleVerified email at google.com
- Berk GulmezogluIowa State UniversityVerified email at iastate.edu
- Erkay SavasSabanci UniversityVerified email at sabanciuniv.edu
- William J MartinWorcester Polytechnic InstituteVerified email at wpi.edu
- Çetin Kaya KoçKoç LabVerified email at ucsb.edu
- Jens-Peter KapsAssociate Professor of Electrical and Computer Engineering, George Mason UniversityVerified email at gmu.edu
- Gizem S. CetinElectrical and Computer Engineering, Worcester Polytechnic InstituteVerified email at wpi.edu
- Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Mark G. KarpovskyProfessor of Computer Engineering, Boston UniversityVerified email at bu.edu
- Dakshi AgrawalIBM Fellow, IBMVerified email at us.ibm.com
- Pankaj RohatgiGoogleVerified email at google.com
- Xinming HuangProfessor, Worcester Polytechnic InstituteVerified email at wpi.edu
- Roel MaesSynopsysVerified email at synopsys.com
- Aykutlu DanaPrincipal Scientist, Metamaterial TechnologiesVerified email at metamaterial.com
- Berk BirandPh.D. Candidate, Columbia UniversityVerified email at ee.columbia.edu
- Kurt RohloffAssociate Professor of Computer Science, NJITVerified email at njit.edu