Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Kang G. ShinKevin & Nancy O'Connor Professor of Computer Science, University of MichiganVerified email at umich.edu
- Sihui HanMicrosoftVerified email at umich.edu
- Kyong-Tak ChoPh.D Student at University of Michigan, Ann Arbor, USAVerified email at umich.edu
- Mert D. PeséAssistant Professor, Clemson UniversityVerified email at clemson.edu
- Troy StacerUniversity of MichiganVerified email at umich.edu
- Alanson SampleUniversity of MichiganVerified email at umich.edu
- Yasha IravantchiUniversity of MichiganVerified email at umich.edu
- Eric NewberryIntelVerified email at intel.com
- Kyu-Han KimDistinguished Technologist at Hewlett-Packard LaboratoriesVerified email at hpe.com
- Yurong JiangVerified email at usc.edu
- Yu-Chih TungUniversity of MichiganVerified email at umich.edu
- Xiaohua TianProfessor, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Meng JinShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Yuanchao ShuMicrosoft ResearchVerified email at microsoft.com
- Youngmoon LeeHanyang UniversityVerified email at hanyang.ac.kr
- Guanjie ZhengShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Porter JenkinsBrigham Young UniversityVerified email at cs.byu.edu
Follow
Dongyao Chen
Assistant Professor of Computer Science, Shanghai Jiao Tong University (SJTU)
Verified email at sjtu.edu.cn - Homepage