Get my own profile
Public access
View all25 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Moinuddin QureshiProfessor, Georgia Institute of TechnologyVerified email at gatech.edu
Josep TorrellasProfessor of Computer Science, University of Illinois Urbana-ChampaignVerified email at illinois.edu
Wen-mei W. HwuSenior Distinguished Research Scientist, NVIDIA; Professor and Sanders-AMD Chair of Electrical andVerified email at illinois.edu
Suman NathPrincipal Researcher, Microsoft ResearchVerified email at microsoft.com
Ranveer ChandraManaging Director, Research for Industry, GM Networking Research, Microsoft ResearchVerified email at microsoft.com
Deming ChenAbel Bliss Professor. University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Sudipta SenguptaVice President & Distinguished Scientist, Amazon AWSVerified email at amazon.com
Jinghan SunUIUCVerified email at illinois.edu
Benjamin ReidysUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Yuhao ZhuUniversity of RochesterVerified email at rochester.edu
xinyu xingNorthwestern UniversityVerified email at northwestern.edu
Raghunath RajachandrasekarEnfabricaVerified email at enfabrica.net
Yuqi XueUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Marc SnirUniversity of Illinois at Urbana ChamapignVerified email at illinois.edu
Scott KlaskyOak Ridge National LaboratoryVerified email at ornl.gov
Steve HodgesMicrosoft ResearchVerified email at microsoft.com
Anirudh BadamShhh @ Stealth
Laura (Grupp) CaulfieldSenior Developer, MicrosoftVerified email at microsoft.com