Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Stacey KuznetsovSchool of Arts, Media, and Engineering, Arizona State UniversityVerified email at asu.edu
- James PierceUniversity of Washington, Design; UC Berkeley, Center for Long-Term CybersecurityVerified email at uw.edu
- John CannyUniversity of California, BerkeleyVerified email at cs.berkeley.edu
- Sunyoung kimRutgers UniversityVerified email at rutgers.edu
- Cesar TorresAssistant Professor of Computer Science & Engineering @ The University of Texas at ArlingtonVerified email at uta.edu
- Joanne LoElysian Labs, IncVerified email at elysianlabs.io
- Jennifer MankoffUniversity of WashingtonVerified email at cs.washington.edu
- Molly Jane NicholasUniversity of California, BerkeleyVerified email at berkeley.edu
- Katherine W. SongDelft University of TechnologyVerified email at tudelft.nl
- Rundong TianUniversity of California, BerkeleyVerified email at berkeley.edu
- Sarah StermanAssistant Research Professor, UIUCVerified email at berkeley.edu
- Elizabeth GoodmanBerkeley, IntelVerified email at ischool.berkeley.edu
- Christine DierkResearch Scientist | Adobe ResearchVerified email at berkeley.edu
- Christopher MyersUC Berkeley, The Center for Information Technology Research in the Interest of Society (CITRIS)Verified email at berkeley.edu
- Doris Jung-Lin LeeUniversity of California, BerkeleyVerified email at illinois.edu
- Mark D GrossProfessor of Computer Science, University of Colorado BoulderVerified email at colorado.edu
- Marcus FothProfessor of Urban Informatics, School of Design, Queensland University of TechnologyVerified email at qut.edu.au
- Ron WakkaryProfessor, Simon Fraser University and Eindhoven University of TechnologyVerified email at sfu.ca
- Jasper Tran O'LearyUniversity of WashingtonVerified email at cs.washington.edu
- Ken GoldbergProfessor, UC Berkeley and UCSFVerified email at berkeley.edu