Get my own profile
Public access
View all23 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Lei YingProfessor at the University of Michigan, Ann ArborVerified email at umich.edu
- Junshan ZhangElectrical and Computer Engineering, UC Davis (Google Scholar not updated since 2020)Verified email at ucdavis.edu
- Mor Harchol-BalterBruce J. Nelson Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- R. SrikantUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Kai ZhuResearch Assistant in Arizona State UniversityVerified email at asu.edu
- Siva Theja MaguluriGeorgia Institute of TechnologyVerified email at gatech.edu
- Xiaohan KangPostdoc at University of Illinois at Urbana–ChampaignVerified email at illinois.edu
- Alan Scheller-WolfTepper School of Business, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
- Haotian JiangAssistant Professor, Computer Science Department, University of ChicagoVerified email at uchicago.edu
- Giulia FantiCarnegie Mellon University, ECE DepartmentVerified email at andrew.cmu.edu
- Juan Jose JaramilloData Engineer, Cisco Tetration AnalyticsVerified email at cisco.com