Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Lei YingProfessor at the University of Michigan, Ann ArborVerified email at umich.edu
Junshan ZhangElectrical and Computer Engineering, University of California DavisVerified email at ucdavis.edu
R. SrikantUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Mor Harchol-BalterBruce J. Nelson Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Kai ZhuResearch Assistant in Arizona State UniversityVerified email at asu.edu
Siva Theja MaguluriGeorgia Institute of TechnologyVerified email at gatech.edu
Xiaohan KangPostdoc at University of Illinois at Urbana–ChampaignVerified email at illinois.edu
Alan Scheller-WolfTepper School of Business, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Haotian JiangPh.D. Student at University of WashingtonVerified email at uw.edu
Juan Jose JaramilloData Engineer, Cisco Tetration AnalyticsVerified email at cisco.com
Giulia FantiCarnegie Mellon University, ECE DepartmentVerified email at andrew.cmu.edu