Get my own profile
Co-authors
Ning WengProfessor of Electrical and Computer Engineering, Southern Illinois University CarbondaleVerified email at siu.edu
Anna NagurneyJohn F. Smith Memorial Professor, Isenberg School of Management, University of MassachusettsVerified email at isenberg.umass.edu
Xin HuangSenior Research Scientist / Technologist at Cyan Inc.Verified email at cyaninc.com
Danai ChasakiVillanova UniVerified email at villanova.edu
Abhishek DwarakiWashington University in St. LouisVerified email at wustl.edu
Sriram NatarajanGoogle Inc.Verified email at google.com
Jonathan TurnerSenior Professor of Computer Science, Washington University in St. LouisVerified email at wustl.edu
Ilia Baldine (post-2013 Ilya Baldin)Director, Network Research and Infrastructure, RENCI/UNC Chapel HillVerified email at renci.org
Kenneth L. CalvertProfessor of Computer Science, University of KentuckyVerified email at netlab.uky.edu
Wayne BurlesonUniversity of Massachusetts Amherst, AMD ResearchVerified email at ecs.umass.edu
Guy GOGNIATProfessorVerified email at univ-ubs.fr
Yan CaiMicrosoftVerified email at microsoft.com
George N. RouskasAlumni Distinguished Graduate Professor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Rudra DuttaProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Bernhard PlattnerProfessor of Computer Engineering, ETH ZurichVerified email at ethz.ch
Xinming ChenUniversity of Massachusetts AmherstVerified email at google.com
Y. Sinan HanayAssistant Professor, Erzurum Technical UniversityVerified email at erzurum.edu.tr
Kekai HuPrincipal Security Researcher, IntelVerified email at intel.com
Sivakumar (Shiv) GanapathyCisco SystemsVerified email at cisco.com
Harikrishnan ChandrikakuttyMicrosoft, University of Massachusetts AmherstVerified email at microsoft.com
Tilman Wolf
Professor of Electrical and Computer Engineering, University of Massachusetts Amherst
Verified email at ecs.umass.edu - Homepage