Get my own profile
Public access
View all25 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Yanyan ZhuangUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
- John H. HartmanAssociate Professor of Computer Science, University of ArizonaVerified email at cs.arizona.edu
- Trishank Karthik KuppusamyNew York UniversityVerified email at nyu.edu
- Ivan BeschastnikhUniversity of British ColumbiaVerified email at cs.ubc.ca
- Santiago Torres-AriasAssistant Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
- Keith RossProfessor of Computer Science, NYU Abu DhabiVerified email at nyu.edu
- Sai Teja PeddintiGoogle Inc.Verified email at google.com
- Justin SamuelUniversity of California, BerkeleyVerified email at cs.berkeley.edu
- Reza CurtmolaProfessor of Computer Science, New Jersey Institute of Technology (NJIT)Verified email at njit.edu
- Martin K. YehAssociate Professor of Information Sciences and Technology, Penn State UniversityVerified email at psu.edu
- Arvind KrishnamurthyShort-Dooley Professor, Univ. of WashingtonVerified email at cs.washington.edu
- Thomas AndersonWarren Francis and Wilma Kolm Bradley Chair, CSE, University of WashingtonVerified email at cs.washington.edu
- Berat Can ŞenelIndependent researcherVerified email at beratsenel.com
- Timur Friedmanassistant professor of computer science, Sorbonne UniversitéVerified email at sorbonne-universite.fr
- Dan GopsteinNYUVerified email at nyu.edu
- Jeff RasleyMicrosoftVerified email at microsoft.com
- Stephen KobourovProfessor of Computer Science, Technical University MunichVerified email at tum.de
- Rodrigo FonsecaSenior Principal Research Manager, Microsoft ResearchVerified email at microsoft.com
- Yuriy BrunManning College of Information and Computer Sciences, University of Massachusetts AmherstVerified email at cs.umass.edu
- Ismail KhoffiSecurity-/Privacy Engineer, EPFL - I&C - DEDISVerified email at epfl.ch