Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- John HatcliffUniversity Distinguished Professor, Department of Computing and Information Sciences, Kansas StateVerified email at ksu.edu
- Matthew DwyerThomson Distinguished Professor, University of VirginiaVerified email at virginia.edu
- Ganesan RamalingamMicrosoft Research IndiaVerified email at microsoft.com
- Kapil VaswaniMicrosoft ResearchVerified email at microsoft.com
- Georg JungEnergyVilleVerified email at acm.org
- Daniel AndresenProfessor of Computer Science, Kansas State UniversityVerified email at ksu.edu
- Joydeep MitraNortheastern UniversityVerified email at northeastern.edu
- Sriram RajamaniMicrosoft Research Verified email at microsoft.com
- David LoProfessor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
- Anindya BanerjeeProfessor, IMDEA Software InstituteVerified email at imdea.org
- Xinming (Simon) OuProfessor of Computer Science and Engineering, University of South FloridaVerified email at usf.edu
- Doina CarageaKansas State UniversityVerified email at ksu.edu
- Sankardas RoyBowling Green State UniversityVerified email at bgsu.edu
- Jyotirmoy V. DeshmukhAssociate Professor, University of Southern CaliforniaVerified email at usc.edu
- Aniruddha GokhaleVanderbilt UniversityVerified email at vanderbilt.edu
- Douglas SchmidtCornelius Vanderbilt Professor of Computer Science at Vanderbilt UniversityVerified email at vanderbilt.edu
- Thomas ZimmermannSr. Principal Researcher at Microsoft Research, RedmondVerified email at microsoft.com
- Christian BirdMicrosoft ResearchVerified email at microsoft.com
- Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityVerified email at cispa.de
- Nachiappan NagappanFacebookVerified email at fb.com