Get my own profile
Public access
View all25 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yanyan ZhuangUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
John H. HartmanAssociate Professor of Computer Science, University of ArizonaVerified email at cs.arizona.edu
Trishank Karthik KuppusamyIndependentVerified email at nyu.edu
Ivan BeschastnikhUniversity of British ColumbiaVerified email at cs.ubc.ca
Santiago Torres-AriasAssistant Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
Keith RossProfessor of Computer Science, NYU Abu DhabiVerified email at nyu.edu
Sai Teja PeddintiGoogle Inc.Verified email at google.com
Justin SamuelUniversity of California, BerkeleyVerified email at cs.berkeley.edu
Reza CurtmolaProfessor of Computer Science, New Jersey Institute of Technology (NJIT)Verified email at njit.edu
Martin K. YehAssociate Professor of Information Sciences and Technology, Penn State UniversityVerified email at psu.edu
Arvind KrishnamurthyShort-Dooley Professor, Univ. of WashingtonVerified email at cs.washington.edu
Thomas AndersonWarren Francis and Wilma Kolm Bradley Chair, CSE, University of WashingtonVerified email at cs.washington.edu
Berat Can ŞenelIndependent researcherVerified email at beratsenel.com
Timur Friedmanassistant professor of computer science, Sorbonne UniversitéVerified email at sorbonne-universite.fr
Dan GopsteinNYUVerified email at nyu.edu
Jeff RasleyMicrosoftVerified email at microsoft.com
Stephen KobourovProfessor of Computer Science, University of ArizonaVerified email at cs.arizona.edu
Rodrigo FonsecaSenior Principal Research Manager, Microsoft ResearchVerified email at microsoft.com
Yuriy BrunManning College of Information and Computer Sciences, University of Massachusetts AmherstVerified email at cs.umass.edu
Ismail KhoffiSecurity-/Privacy Engineer, EPFL - I&C - DEDISVerified email at epfl.ch