Get my own profile
Public access
View all16 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Anna ScaglioneProfessor of Electrical and Computer Engineering, Cornell UniversityVerified email at cornell.edu
- György DánProfessor, KTH Royal Institute of TechnologyVerified email at kth.se
- Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisVerified email at lbl.gov
- Emiliano Dall'AneseBoston UniversityVerified email at bu.edu
- Andrey BernsteinPrincipal Researcher and Group Manager, National Renewable Energy Laboratory (NREL)Verified email at nrel.gov
- Hoi-To WaiAssociate Professor, The Chinese University of Hong KongVerified email at se.cuhk.edu.hk
- Mahdi JameiInvenia LabsVerified email at invenialabs.co.uk
- Teklemariam TesfayCybersecurity EngineerVerified email at jpl.nasa.gov
- Reinhard GentzAmazonVerified email at amazon.com
- Ezzeldin ShereenPhD Candidate, KTH Royal Institute of Technology, SwedenVerified email at kth.se
- Ignacio Losada CarreńoCornell UniversityVerified email at cornell.edu
- David PinneyAnalytics Program Manager, NRECAVerified email at NRECA.coop
- Andreas SpaniasArizona State UniversityVerified email at asu.edu
- Cihan TepedelenliogluArizona State UniversityVerified email at asu.edu
- Daniel ArnoldLawrence Berkeley National LaboratoryVerified email at lbl.gov
- Sy Toan NgoLawrence Berkeley National LabVerified email at lbl.gov
- Nathan JohnsonVerified email at asu.edu
- Nikhil RaviGraduate Research Assistant, Cornell UniversityVerified email at cornell.edu
- Neelesh B. MehtaIndian Institute of Science, BangaloreVerified email at ece.iisc.ernet.in
- Chandra MurthyProfessor, ECE, Indian Institute of ScienceVerified email at iisc.ac.in
Follow
Raksha Ramakrishna
Postdoctoral Researcher, KTH Royal Institute of Technology
Verified email at kth.se - Homepage