Get my own profile
Public access
View all30 articles
15 articles
available
not available
Based on funding mandates
Co-authors
- Ismail GuvencNorth Carolina State UniversityVerified email at ncsu.edu
- Rudra DuttaProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
- Peter BauerProfessor of Electrical EngineeringVerified email at nd.edu
- Jangeun JunNetApp, Inc.Verified email at netapp.com
- Ozgur OzdemirAssociate Research ProfessorVerified email at ncsu.edu
- Maria KihlProfessor in Internetworked Systems, Dept. of Electrical and Information Technology, Lund UniversityVerified email at eit.lth.se
- Simran SinghNorth Carolina State UniversityVerified email at ncsu.edu
- Ajit WarrierSilvus TechnologiesVerified email at silvustechnologies.com
- Injong RheeProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
- Sung Joon MaengHanyang University, ERICAVerified email at hanyang.ac.kr
- Beakcheol JangYonsei UniversityVerified email at yonsei.ac.kr
- Alex DeanAssociate Professor of Electrical and Computer Engineering, North Carolina State UniversityVerified email at ncsu.edu
- Vuk MarojevicAssociate Professor, Mississippi StateVerified email at msstate.edu
- Huaiyu DaiProfessor of Electrical and Computer Engineering, NC State UniversityVerified email at ncsu.edu
- Brian A. FloydAlton & Mildred Lancaster Professor in Electrical & Computer Engineering, NC State UniversityVerified email at ncsu.edu
- Arupjyoti BhuyanDirector, INL Wireless Security InstituteVerified email at inl.gov
- Magreth MushiResearch AssociateVerified email at ncsu.edu
- Frank MuellerProfessor of Computer Science, North Carolina State UniversityVerified email at cs.ncsu.edu
- Edgar LobatonNorth Carolina State UniversityVerified email at ncsu.edu
- Tahmid Latif, PhDWentworth Institute of TechnologyVerified email at wit.edu