Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Steve ZdancewicProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Elsa L GunterResearch Associate Professor, University of Illinois at Urbana - ChampaignVerified email at illinois.edu
- Lennart BeringerVerified email at pm.me
- Joseph DeviettiAssistant Professor of Computer & Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Yuanfeng PengGoogle / UPennVerified email at cis.upenn.edu
- Andrew W. AppelProfessor of Computer Science, Princeton UniversityVerified email at princeton.edu
- Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Yao LiPortland State UniversityVerified email at pdx.edu
- Yishuai LiEngineer II, Alibaba CloudVerified email at alibaba-inc.com
- Jeehoon KangKAIST School of ComputingVerified email at kaist.ac.kr
- Viktor VafeiadisMax Planck Institute for Software Systems (MPI-SWS), Saarland Informatics Campus (SIC)Verified email at mpi-sws.org
- Chung-Kil HurSeoul National UniversityVerified email at sf.snu.ac.kr
- Karen M. FeighProfessor of Cognitive Engineering, Georgia Institute of TechnologyVerified email at gatech.edu
- Matthew L. BoltonAssociate Professor of Systems Engineering at the University of VirginiaVerified email at virginia.edu
- Ellen J. BassProfessor, Drexel UniversityVerified email at drexel.edu
- Aleksey NoginHead of Research, Red Balloon SecurityVerified email at redballoonsecurity.com
- santiago cuellarPhD, Princeton UniversityVerified email at princeton.edu
- Nick GiannarakisAmazon Web ServicesVerified email at amazon.com
- Jean-Marie MadiotINRIAVerified email at inria.fr
- Michael D. AdamsUniversity of UtahVerified email at utah.edu
Follow
William Mansky
Assistant Professor, University of Illinois at Chicago
Verified email at uic.edu - Homepage