Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Malcolm HeywoodProfessor, Computer Science, Dalhousie UniversityVerified email at cs.dal.ca
Atif KhanComputer Science, University of WaterlooVerified email at uwaterloo.ca
Hadi HosseiniPenn State UniversityVerified email at psu.edu
Kate LarsonUniversity of WaterlooVerified email at uwaterloo.ca
Daniel LizotteAssociate Professor of Computer Science; Associate Professor of Epidemiology and BiostatisticsVerified email at uwo.ca
Alan TsangCarleton UniversityVerified email at carleton.ca
Catherine HollowayGraduate Student, Institute for Quantum ComputingVerified email at iqc.ca
Christopher ErvenCEO, KETS Quantum Security Ltd;Verified email at kets-quantum.com
Cecylia BocovichUniversity of WaterlooVerified email at uwaterloo.ca
Steven J. MurdochDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Tariq ElahiAssistant Professor, School of Informatics - University of EdinburghVerified email at ed.ac.uk
Hooman Mohajeri MoghaddamPrinceton University, International Computer Science Institute (ICSI),Verified email at princeton.edu
John ChampaignMassachusetts Institute of TechnologyVerified email at mit.edu
Darren AbramsonAssociate Professor of Philosophy, Dalhousie UniversityVerified email at dal.ca
Sawyer WeldenVerified email at wakehealth.edu
Eric BrighamVerified email at ncf.edu