Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Roser MoranteCLTL Lab - VU AmsterdamEmail verificata su vu.nl
- Md Mosharaf HossainApplied Scientist, AmazonEmail verificata su amazon.com
- Dhivya ChinnappaJPMorgan Chase & Co.Email verificata su chase.com
- Alakananda VempalaBloomberg LPEmail verificata su bloomberg.net
- Lyle UngarUniversity of PennsylvaniaEmail verificata su cis.upenn.edu
- H. Andrew SchwartzStony Brook UniversityEmail verificata su cs.stonybrook.edu
- Margaret L. KernProfessor, University of MelbourneEmail verificata su unimelb.edu.au
- Johannes C. EichstaedtStanford UniversityEmail verificata su stanford.edu
- "Martin Seligman"University of PennsylvaniaEmail verificata su upenn.edu
- Daniel TakabiProfessor and Director of School of Cybersecurity, Old Dominion UniversityEmail verificata su odu.edu
- Alexis PalmerUniversity of Colorado BoulderEmail verificata su colorado.edu
- Michal KosinskiStanford UniversityEmail verificata su stanford.edu
- David StillwellCambridge UniversityEmail verificata su cam.ac.uk
- Lingzi HongUniversity of North TexasEmail verificata su unt.edu
- Manar AlohalyAssistant Professor at Princess Nourah Bint Abdulrahman UniversityEmail verificata su pnu.edu.sa
- Xinchen YuUniversity of ArizonaEmail verificata su arizona.edu
- Maarten SapCarnegie Mellon UniversityEmail verificata su cmu.edu
- Adam KapelnerAssociate Professor of Mathematics, Queens College, CUNYEmail verificata su qc.cuny.edu
- Gregory ParkTraitLabEmail verificata su sas.upenn.edu
- Tiffany KaoUndergraduate Researcher, University of Texas at AustinEmail verificata su utexas.edu