Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
Matthias GrundmannGoogle ResearchVerified email at google.com
Tingbo HouMetaVerified email at meta.com
Shobha VasudevanProfessor of Computer Engineering, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Artsiom AblavatskiGoogle ResearcgVerified email at google.com
Mahdi FazeliAssociate Professor, School of Information Technology, Halmstad UniversityVerified email at hh.se
Hossein AsadiProfessor, Department of Computer Engineering, Sharif University of TechnologyVerified email at sharif.edu
Jayanand Asok KumarUniversity of Illinois at Urbana-Champaign, Qualcomm AtherosVerified email at qca.qualcomm.com
Mehdi B. TahooriProfessor of Computer Science, Karlsruhe Institute of Technology, GermanyVerified email at kit.edu
Genzhi YeSoftware Engineer, Google Inc.Verified email at google.com
Chenjie GuDeepMindVerified email at google.com
Eli ChiproutIntel Corporation Strategic CAD labsVerified email at intel.com
HV PoorMichael Henry Strater University Professor, Princeton UniversityVerified email at princeton.edu
Rasoul EtesamiUniversity of Illinois Urbana-ChampaignVerified email at illinois.edu
Nahid Farhady GhalatySecurity ML EngineerVerified email at vt.edu