Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
- RUILONG XIEIBMVerified email at ibm.com
- Steven BentleyGLOBALFOUNDRIESVerified email at globalfoundries.com
- Kang L. WangElectrical Engineering DepartmentVerified email at ee.ucla.edu
- Ali KhakifiroozIntelVerified email at intel.com
- Magnus WillanderVerified email at liu.se
- Faxian XiuPhysics Department, Fudan UniversityVerified email at fudan.edu.cn
- Nicolas LOUBETIBM ResearchVerified email at us.ibm.com
- Alexander KhitunUniversity of California RiversideVerified email at engr.ucr.edu
- K RimQualcommVerified email at qti.qualcomm.com
- Dmitri E. NikonovDistinguished Engineer, Kepler ComputingVerified email at intel.com
- Serge OktyabrskySUNY Polytechnic InstituteVerified email at sunypoly.edu
- Jianshi TangTsinghua University / IBM Research / UCLAVerified email at tsinghua.edu.cn
- Kos Galatsis Ph.D.President of Forensics DetectorsVerified email at forensicsdetectors.com
- Vwani RoychowdhuryProfessor of Electrical and Computer Engineering, UCLAVerified email at ee.ucla.edu
- Per LundgrenProfessor, Chalmers University of TechnologyVerified email at chalmers.se
- D. S. MisraPhysics Department, Indian Institute of Technology BombayVerified email at iitb.ac.in
Follow
Ajey Jacob
Information Sciences Institute, University of Southern California
Verified email at isi.edu