Get my own profile
Public access
View all30 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Lintao ZhangMicrosoft Research AsiaVerified email at microsoft.com
Kurt KeutzerProfessor of the Graduate School, EECS, University of California, BerkeleyVerified email at berkeley.edu
Margaret MartonosiProfessor of Computer Science, Princeton UniversityVerified email at princeton.edu
Aarti GuptaPrinceton UniversityVerified email at cs.princeton.edu
Vivek TiwariIntel Corp, Princeton UniversityVerified email at intel.com
Alberto Sangiovanni VincentelliProfessor of EECS, University of California, BerkeleyVerified email at eecs.berkeley.edu
Pramod SubramanyanIndian Institute of Technology KanpurVerified email at cse.iitk.ac.in
Andrew WolfeSanta Clara UniversityVerified email at scu.edu
Matthew MoskewiczTeslaVerified email at alumni.princeton.edu
Guido AraujoIC-UNICAMPVerified email at ic.unicamp.br
Li-Shiuan PehProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Yakir VizelTechnionVerified email at cs.technion.ac.il
Georg WeissenbacherProfessor of Computer Science, TU WienVerified email at tuwien.ac.at
Jan RabaeyProfessor of EECS, University of California at BerkeleyVerified email at berkeley.edu
Sayak RaySecurity Researcher, Intel CorporationVerified email at intel.com
Shuyuan ZhangOpenAI, Google, Princeton UniversityVerified email at princeton.edu
David I. AugustComputer Science, Princeton UniversityVerified email at princeton.edu
Lawrence PileggiCoraluppi Head and Tanoto Professor of ECE, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Follow
Sharad Malik
Professor of Electrical and Computer Engineering, Princeton University
Verified email at princeton.edu - Homepage