Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Robert HeathLampe Distinguished Professor, North Carolina State UniversityVerified email at ncsu.edu
Rishabh SinghResearch Scientist, Google BrainVerified email at google.com
Christopher WagnerPurdue UniversityVerified email at purdue.edu
Milind KulkarniAssociate Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
Thomas HenzingerIST AustriaVerified email at ist.ac.at
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Loris D'AntoniUniversity of Wisconsin, MadisonVerified email at cs.wisc.edu
Arjun RadhakrishnaMicrosoftVerified email at microsoft.com
Jyotirmoy V. DeshmukhAssociate Professor, University of Southern CaliforniaVerified email at usc.edu
Nageen HimayatVerified email at ieee.org
Thorsten TarrachAmazon Web ServicesVerified email at amazon.com
Bishwarup MondalIntelVerified email at intel.com
Swarat ChaudhuriProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
Pavol CernyProfessor, TU WienVerified email at tuwien.ac.at
Leonid RyzhykFelderaVerified email at feldera.com
Edmund ClarkeUniversity Professor Emeritus at Carnegie Mellon UniversityVerified email at cs.cmu.edu
Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Brian L. EvansEngineering Foundation Professor, ECE, WNCG, University of Texas at AustinVerified email at ece.utexas.edu
Jan OtopUniversity of WrocławVerified email at cs.uni.wroc.pl
Shengwei AnPurdue UniversityVerified email at purdue.edu