Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Erez PetrankProfessor of Computer Science, Technion - Israel Institute of TechnologyVerified email at cs.technion.ac.il
Michael FactorIBM Fellow -- Storage and SystemsVerified email at il.ibm.com
Alexandra Shulman-PelegEY CybersecurityVerified email at ey.com
Mooly SagivTel Aviv UniversityVerified email at acm.org
Spyridon V. GogouvitisResearcher at the National Technical University of AthensVerified email at mail.ntua.gr
Dimosthenis KyriazisUniversity of PiraeusVerified email at unipi.gr
Danny HarnikIBM Research - HaifaVerified email at il.ibm.com
Michael C. JaegerSiemens AGVerified email at mcj.de
Gil VernikIBM ResearchVerified email at il.ibm.com
Athanasios (Thanos) VoulodimosAssistant Professor, School of Electrical & Computer Engineering, National Technical Univ. of AthensVerified email at mail.ntua.gr
Anil KurmusIBM Research - ZurichVerified email at zurich.ibm.com
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Katherine BarabashIBM Research - Haifa - Cloud NetworkingVerified email at il.ibm.com
Dmitry SotnikovAmazonVerified email at amazon.com
Dalit NaorSchool of Computer Science, Academic College of Tel-Aviv YaffoVerified email at mta.ac.il
David BreitgandIBM Research -- HaifaVerified email at il.ibm.com
Massimo VillariUniversity of MessinaVerified email at unime.it
David F. BaconGoogleVerified email at google.com
V. T. RajanPrincipal Data ScientistVerified email at vtrajan.net
Eran YahavTechnion, IsraelVerified email at cs.technion.ac.il