Get my own profile
Public access
View all24 articles
1 article
available
not available
Based on funding mandates
Co-authors
Lei YingProfessor at the University of Michigan, Ann ArborVerified email at umich.edu
Junshan ZhangElectrical and Computer Engineering, UC Davis (Google Scholar not updated since 2020)Verified email at ucdavis.edu
Mor Harchol-BalterBruce J. Nelson Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
R. SrikantUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Kai ZhuResearch Assistant in Arizona State UniversityVerified email at asu.edu
Siva Theja MaguluriGeorgia Institute of TechnologyVerified email at gatech.edu
Xiaohan KangPostdoc at University of Illinois at Urbana–ChampaignVerified email at illinois.edu
Alan Scheller-WolfTepper School of Business, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Haotian JiangAssistant Professor, Computer Science Department, University of ChicagoVerified email at uchicago.edu
Giulia FantiCarnegie Mellon University, ECE DepartmentVerified email at andrew.cmu.edu
Juan Jose JaramilloData Engineer, Cisco Tetration AnalyticsVerified email at cisco.com