Get my own profile
Public access
View all13 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Quang Tran MinhHochiminh City University of TechnologyVerified email at hcmut.edu.vn
- David SandsProfessor of Computer Science, Chalmers University of TechnologyVerified email at chalmers.se
- Tam V. NguyenAssociate Professor of Computer Science, University of DaytonVerified email at nus.edu.sg
- Meera SridharAssistant Professor, Software and Information Systems, University of North Carolina at CharlotteVerified email at uncc.edu
- Duc-Ly VuLecturer at Eastern International UniversityVerified email at eiu.edu.vn
- Lieven DesmetProfessor Security & Privacy, DistriNet Research Group, KU LeuvenVerified email at cs.kuleuven.be
- Hong-Linh TruongAalto UniversityVerified email at aalto.fi
- Andrey ChudnovD. E. Shaw & Co, L.P.Verified email at chudnov.com
- VN VenkatakrishnanProfessor of Computer Science, University of Illinois at ChicagoVerified email at uic.edu
- Panchakshari HiremathMaster of Computer ScienceVerified email at udayton.edu
- Jonas MagaziniusPhD of Computer Science, Chalmers UniversityVerified email at assured.se
- Rigel GjomemoUniversity of Illinois at ChicagoVerified email at uic.edu
- Phu H. NguyenSenior Research Scientist, SINTEFVerified email at sintef.no
- Maliheh MonshizadehUniversity of Wisconsin-MadisonVerified email at wisc.edu
- Kevin W. HamlenLouis A. Beecherl, Jr. Distinguished Professor of Computer Science, The University of Texas atVerified email at utdallas.edu
- Ahmed EL OUADRHIRIRockford University, IL, USA.Verified email at rockford.edu
- Lenore D. ZuckUniversity of Illinois, Chicago
Follow
Phu H. Phung
Associate Professor of Computer Science at University of Dayton
Verified email at udayton.edu - Homepage