Get my own profile
Public access
View all52 articles
1 article
available
not available
Based on funding mandates
Co-authors
Christos FaloutsosCMUVerified email at cs.cmu.edu
Leman AkogluAssociate Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Hanghang TongUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Tina Eliassi-RadProfessor, Northeastern UniversityVerified email at eliassi.org
U KangProfessor of Computer Science and Engineering, Seoul National UniversityVerified email at snu.ac.kr
Brian GallagherComputer Scientist, Lawrence Livermore National LaboratoryVerified email at llnl.gov
Evangelos E. PapalexakisAssociate Professor, University of California RiversideVerified email at cs.ucr.edu
Jilles VreekenCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Michele BerlingerioNovartis - Insight Strategy & DesignVerified email at novartis.com
Stephan GünnemannProfessor of Computer Science, Technical University of MunichVerified email at in.tum.de
Joshua T. VogelsteinDept of Biomedical Engineering, Johns Hopkins UniversityVerified email at jhu.edu
Duen Horng "Polo" ChauAssociate Professor, Georgia Institute of TechnologyVerified email at gatech.edu
Sugato BasuDistinguished Scientist at GoogleVerified email at google.com
Walter S. Lasecki-Verified email at umich.edu
Hsing-Kuo PaoNational Taiwan University of Science and TechnologyVerified email at mail.ntust.edu.tw
Miguel AraujoSemasioVerified email at semasio.com
Paul N. BennettPartner Research Manager, Microsoft ResearchVerified email at microsoft.com
Aaditya RamdasStatistics and Machine Learning, Carnegie Mellon UniversityVerified email at stat.cmu.edu
Eric HorvitzMicrosoft ResearchVerified email at microsoft.com
Wolfgang GatterbauerKhoury College of Computer Sciences, Northeastern UniversityVerified email at northeastern.edu