Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Yefei PengGoogle; Yahoo Labs; University of Pittsburgh; Purdue UniversityVerified email at alumni.pitt.edu
- Kai A. OlsenMolde University College and University of BergenVerified email at himolde.no
- Shaun M. EackUniversity of Pittsburgh School of Social Work and Department of PsychiatryVerified email at pitt.edu
- Richard SchulzDistinguished Service Professor of Psychiatry, University of PittsburghVerified email at pitt.edu
- Martin B.H. WeissProfessor of Telecommunications, University of PittsburghVerified email at pitt.edu
- Peter BrusilovskyProfessor, School of Computing and Information, University of PittsburghVerified email at pitt.edu
- Andy SnowOhio UniversityVerified email at ohio.edu
- James JoshiProfessor, SCI, University of Pittsburgh; Expert NSF-TIPVerified email at pitt.edu
- Joseph KushDuquesne UniversityVerified email at duq.edu
- Daniel TakabiProfessor and Director of School of Cybersecurity, Old Dominion UniversityVerified email at odu.edu
- Stephen HirtleSchool of Computing and Information, University of PittsburghVerified email at pitt.edu
- Marut BuranarachNECTEC, ThailandVerified email at nectec.or.th