Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Hsien-Hsin Sean LeeMetaVerified email at fb.com
Weidong ShiUniversity of HoustonVerified email at uh.edu
Manu AwasthiAshoka UniversityVerified email at ashoka.edu.in
Stuart BilesFellow, ARMVerified email at arm.com
Emre OzerPragmaticVerified email at pragmaticsemi.com
Anahita ShayestehUCLA, Intel, Samsung, Luminous ComputingVerified email at cs.ucla.edu
Qiumin XuPhD., Software Engineer at GoogleVerified email at usc.edu
Huzefa Siyamwala[24]7.aiVerified email at 247-inc.com
Ronald DreslinskiUniversity of MichiganVerified email at umich.edu
Chander SudanthiVerified email at arm.com
Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu
Vaibhav GogteGoogleVerified email at umich.edu
Zhichao CaoAssistant Professor, Arizona State UniversityVerified email at asu.edu
Dam SunwooSenior Principal Research Engineer, Arm ResearchVerified email at arm.com
Hrishikesh AmurSoftware Engineer, GoogleVerified email at google.com
Dong Hyuk WooGoogleVerified email at google.com
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Mitchell HayengaUniversity of Wisonsin-MadisonVerified email at wisc.edu
Min LeeIntelVerified email at intel.com
Prakash RamrakhyaniResearcher, Arm IncVerified email at arm.com