Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Clay WilliamsGreenphireVerified email at greenphire.com
Giuseppe ValettoFondazione Bruno KesslerVerified email at cs.columbia.edu
Kaan KatirciogluMicrosoftVerified email at microsoft.com
Emanuel MelachrinoudisNortheastern UniversityVerified email at coe.neu.edu
David GamarnikProfessor of Operations Research, MITVerified email at mit.edu
Thomas Ericksonretired@MinneapolisVerified email at acm.org
Catalina DanisResearch Staff Member, IBM TJ Watson Research CenterVerified email at us.ibm.com
Wendy A. KelloggIBM T.J. Watson Research CenterVerified email at us.ibm.com
Saharon RossetTel Aviv UniversityVerified email at post.tau.ac.il
Chandan K. ReddyProfessor, Computer Science, Virginia TechVerified email at cs.vt.edu
Ching-Yung LinIBM Chief Scientist, Graph ComputingVerified email at us.ibm.com
Paolina CentonzeProfessor of Computer Science, Managing Director of Cybersecurity, Iona University, New RochelleVerified email at iona.edu
Yan LiuProfessor, Director of Machine Learning Center@USCVerified email at usc.edu
Annie YingPhD Candidate, McGill UniversityVerified email at cs.mcgill.ca
Ramesh NatarajanSoftware Engineer, GoogleVerified email at google.com
Janusz MareckiDeepMindVerified email at google.com
Léa Amandine DelerisHead of RISK Artificial Intelligence Research, BNP ParibasVerified email at bnpparibas.com
laura wynterIBM Watson Research CenterVerified email at us.ibm.com
José SantiváñezUTEC - Universidad de Ingeniería y TecnologíaVerified email at utec.edu.pe
Gautam BasuAalto UniversityVerified email at aalto.fi