Get my own profile
Public access
View all12 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Hemant PurohitAssociate Professor, School of Computing, George Mason UniversityVerified email at gmu.edu
- Carlos CastilloICREA Research Professor at Universitat Pompeu FabraVerified email at icrea.cat
- Muhammad ImranSenior Scientist, Qatar Computing Research Institute, Hamad Bin Khalifa UniversityVerified email at hbku.edu.qa
- Bonnie StabileAssociate Professor, George Mason UniversityVerified email at gmu.edu
- Aubrey GrantSchar School of Policy and Government, George Mason UniversityVerified email at gmu.edu
- Valerie ShalinProfessor of Psychology, Wright State UniversityVerified email at knoesis.org
- Brenda BannanGeorge Mason UniversityVerified email at gmu.edu
- Aditya JohriProfessor & Dr. L.Cranberg Endowed Research Fellow, Engineering & Computing, George Mason UniversityVerified email at gmu.edu
- Andreas StolckeDistinguished AI Scientist, UniphoreVerified email at icsi.berkeley.edu
- Ariya RastrowAmazon.comVerified email at amazon.com
- Ivan BulykoAmazonVerified email at bbn.com
- Ankur GandheScientist, AmazonVerified email at amazon.com
- Denis FilimonovVerified email at amazon.com
- Qi LuoScientist, Amazon SpeechVerified email at amazon.com
- Jing LiuSr. Applied Scientist, Amazon.comVerified email at amazon.com
- Roger RenAmazonVerified email at amazon.com
- Elisa M. TorresGeorge Mason UniversityVerified email at gmu.edu
- Steve PetersonCertified Emergency ManagerVerified email at nih.gov
- Yasas SenarathGeorge Mason UniversityVerified email at gmu.edu
- Md Abdullah Al Hafiz KhanAssistant Professor, Department of Compute Science, Kennesaw State UniversityVerified email at kennesaw.edu