Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Stephan DiestelhorstSystem Architect, AMDVerified email at amd.com
- Vaibhav GogteGoogleVerified email at umich.edu
- Thomas F. WenischProf. of CSE, University of MichiganVerified email at umich.edu
- Satish NarayanasamyUniversity of MichiganVerified email at umich.edu
- Peter M. ChenUniversity of MichiganVerified email at umich.edu
- Geoff V MerrettProfessor, University of Southampton | Head of Centre for IoT and Pervasive SystemsVerified email at ecs.soton.ac.uk
- Alex S WeddellAssociate Professor, Electronics and Computer Science, University of SouthamptonVerified email at ecs.soton.ac.uk
- Sivert T. SliperPhD, Electronics & Computer Science, University of SouthamptonVerified email at lyse.net
- Nikos NikolerisPrincipal Research Engineer, Arm ResearchVerified email at arm.com
- Wendy ElsasserVerified email at arm.com
- Aasheesh KolliPennsylvania State University and VMware ResearchVerified email at psu.edu
- Prakash RamrakhyaniResearcher, Arm IncVerified email at arm.com
- Andreas SandbergPrincipal Engineer, Arm Ltd.Verified email at arm.com
- Mrinmoy GhoshFacebookVerified email at fb.com
- Dam SunwooSenior Principal Research Engineer, Arm ResearchVerified email at arm.com
- Yan SolihinCharles N. Millican Chair Professor of Computer Science at UCF, Director for Cybersecurity andVerified email at ucf.edu
- Mohammad A. AlshboulJordan University of Science and TechnologyVerified email at just.edu.jo
- James TuckProfessor of Electrical and Computer Engineering at North Carolina State UniversityVerified email at ncsu.edu
- James BruseyProfessor of Computer Science, Coventry UniversityVerified email at coventry.ac.uk
- Duncan McFarlaneUniversity of CambridgeVerified email at eng.cam.ac.uk