Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Omer TrippAmazonVerified email at google.com
Takaaki TateishiIBM Research - TokyoVerified email at jp.ibm.com
Larry KovedFormerly at IBM T.J. Watson Research CenterVerified email at alumni.union.edu
Pietro FerraraAssistant Professor, Universitą Ca' Foscari di Venezia, ItalyVerified email at unive.it
Julian DolbyIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Shay ArtziAmazonVerified email at amazon.com
Paolina CentonzeProfessor of Computer Science, Iona College, New Rochelle, New YorkVerified email at iona.edu
Stephen FinkIBMVerified email at us.ibm.com
Paul CastroResearch Staff Member, IBM ResearchVerified email at us.ibm.com
Frank TipProfessor, Northeastern UniversityVerified email at northeastern.edu
Manu SridharanAssociate Professor, Computer Science and Engineering, University of California, RiversideVerified email at sridharan.net
Roee HayVulnerability researcherVerified email at securityresear.ch
Liu PengRSM@IBM ResearchVerified email at us.ibm.com
Shaohan HuJPMorgan Chase & Co.Verified email at jpmchase.com
Jay M. GambettaIBM QuantumVerified email at us.ibm.com
Chun-Fu (Richard) ChenJPMorgan Chase & Co.Verified email at jpmchase.com
Antonio MezzacapoIBM Quantum - Watson Research CenterVerified email at us.ibm.com
Eran YahavTechnion, IsraelVerified email at cs.technion.ac.il
Umut TopkaraIBM Research, Purdue UniversityVerified email at topkara.org
Panagiotis BarkoutsosResearcher, IBM Research ZRL, ZurichVerified email at zurich.ibm.com