Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Lei YingProfessor at the University of Michigan, Ann ArborVerified email at umich.edu
Junshan ZhangElectrical and Computer Engineering, UC Davis (Google Scholar not updated since 2020)Verified email at ucdavis.edu
R. SrikantUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Mor Harchol-BalterBruce J. Nelson Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Kai ZhuResearch Assistant in Arizona State UniversityVerified email at asu.edu
Siva Theja MaguluriGeorgia Institute of TechnologyVerified email at gatech.edu
Xiaohan KangPostdoc at University of Illinois at Urbana–ChampaignVerified email at illinois.edu
Alan Scheller-WolfTepper School of Business, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Haotian JiangPostdoc Researcher at Microsoft Research, RedmondVerified email at microsoft.com
Giulia FantiCarnegie Mellon University, ECE DepartmentVerified email at andrew.cmu.edu
Juan Jose JaramilloData Engineer, Cisco Tetration AnalyticsVerified email at cisco.com