Get my own profile
Public access
View all33 articles
14 articles
available
not available
Based on funding mandates
Co-authors
Ismail GuvencNorth Carolina State UniversityVerified email at ncsu.edu
Rudra DuttaProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Peter BauerProfessor of Electrical EngineeringVerified email at nd.edu
Jangeun JunNetApp, Inc.Verified email at netapp.com
Ozgur OzdemirAssociate Research ProfessorVerified email at ncsu.edu
Maria KihlProfessor in Internetworked Systems, Dept. of Electrical and Information Technology, Lund UniversityVerified email at eit.lth.se
Sung Joon MaengHanyang University, ERICAVerified email at hanyang.ac.kr
Simran SinghNorth Carolina State UniversityVerified email at ncsu.edu
Ajit WarrierSilvus TechnologiesVerified email at silvustechnologies.com
Vuk MarojevicAssociate Professor, Mississippi StateVerified email at msstate.edu
Injong RheeProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Beakcheol JangYonsei UniversityVerified email at yonsei.ac.kr
Alex DeanAssociate Professor of Electrical and Computer Engineering, North Carolina State UniversityVerified email at ncsu.edu
Huaiyu DaiProfessor of Electrical and Computer Engineering, NC State UniversityVerified email at ncsu.edu
Brian A. FloydAlton & Mildred Lancaster Professor in Electrical & Computer Engineering, NC State UniversityVerified email at ncsu.edu
Arupjyoti BhuyanDirector, INL Wireless Security InstituteVerified email at inl.gov
Magreth MushiResearch AssociateVerified email at ncsu.edu
Frank MuellerProfessor of Computer Science, North Carolina State UniversityVerified email at cs.ncsu.edu
Edgar LobatonNorth Carolina State UniversityVerified email at ncsu.edu
Tahmid Latif, PhDWentworth Institute of TechnologyVerified email at wit.edu