Get my own profile
Public access
View all48 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sam AinsworthLecturer in Systems and Hardware Security, University of EdinburghVerified email at ed.ac.uk
Michael O'BoyleProfessor of Computer Science, University of EdinburghVerified email at inf.ed.ac.uk
Christophe DubachAssociate Professor, McGill UniversityVerified email at mcgill.ca
Simone CampanoniNorthwestern UniversityVerified email at eecs.northwestern.edu
Antonio GonzalezProfessor, Universitat Politecnica de CatalunyaVerified email at ac.upc.edu
David BrooksHaley Family Professor of Computer Science, Harvard UniversityVerified email at eecs.harvard.edu
Jaume AbellaBarcelona Supercomputing Center (BSC)Verified email at bsc.es
Gu-Yeon WeiRobert and Suzanne Case Professor of EE and CS, Harvard University and Fellow, Samsung ResearchVerified email at eecs.harvard.edu
Vasileios PorpodasGoogleVerified email at cl.cam.ac.uk
Edwin V. BonillaPrincipal Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Oğuz ErginProfessor, TOBB University of Economics and TechnologyVerified email at etu.edu.tr
Dr. Jonathan WoodruffResearch Associate, Cambridge UniversityVerified email at cam.ac.uk
Simon MooreProfessor of Computer Engineering, University of CambridgeVerified email at cl.cam.ac.uk
Alexander RichardsonGoogle, University of CambridgeVerified email at google.com
Robert N. M. WatsonProfessor, Department of Computer Science and Technology, University of CambridgeVerified email at cl.cam.ac.uk
Vijay Janapa ReddiHarvard UniversityVerified email at eecs.harvard.edu
Ruoyu ZhouUniversity of CambridgeVerified email at cam.ac.uk
Svilen KanevSoftware Engineer, GoogleVerified email at google.com
Anouk Van LaerUniversity College LondonVerified email at ee.ucl.ac.uk
Philip M. WattsDepartment of Electronic and Electrical Engineering, University College LondonVerified email at ucl.ac.uk