Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Clay WilliamsGreenphireVerified email at greenphire.com
- Giuseppe ValettoFondazione Bruno KesslerVerified email at cs.columbia.edu
- Kaan KatirciogluMicrosoftVerified email at microsoft.com
- Emanuel MelachrinoudisNortheastern UniversityVerified email at coe.neu.edu
- David GamarnikProfessor of Operations Research, MITVerified email at mit.edu
- Thomas Ericksonretired@MinneapolisVerified email at acm.org
- Catalina DanisResearch Staff Member, IBM TJ Watson Research CenterVerified email at us.ibm.com
- Wendy A. KelloggIBM T.J. Watson Research CenterVerified email at us.ibm.com
- Saharon RossetTel Aviv UniversityVerified email at post.tau.ac.il
- Chandan K. ReddyProfessor, Computer Science, Virginia TechVerified email at cs.vt.edu
- Ching-Yung LinIBM Chief Scientist, Graph ComputingVerified email at us.ibm.com
- Paolina CentonzeProfessor of Computer Science, Managing Director of Cybersecurity, Iona University, New RochelleVerified email at iona.edu
- Yan LiuProfessor, Director of Machine Learning Center@USCVerified email at usc.edu
- Annie YingPhD Candidate, McGill UniversityVerified email at cs.mcgill.ca
- Ramesh NatarajanResearch Professor, Yeshiva University, NYVerified email at yu.edu
- Janusz MareckiDeepMindVerified email at google.com
- laura wynterIBM Watson Research CenterVerified email at us.ibm.com
- Léa Amandine DelerisHead of RISK Artificial Intelligence Research, BNP ParibasVerified email at bnpparibas.com
- José SantiváñezUTEC - Universidad de Ingeniería y TecnologíaVerified email at utec.edu.pe
- Gautam BasuAalto UniversityVerified email at aalto.fi