Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Vinod PerisChief Development Officer, Constella IntelligenceVerified email at constellaintelligence.com
Leonidas GeorgiadisAristotle University of ThessalonikiVerified email at auth.gr
Israel CidonVMware ResearchVerified email at ee.technion.ac.il
Ian T. FosterUniversity of Chicago and Argonne National LaboratoryVerified email at uchicago.edu
Carl KesselmanProfessor University of Southern California Information Sciences InstituteVerified email at isi.edu
Ariel OrdaProfessor of Electrical Engineering, Technion - Israel Institute of TechnologyVerified email at ee.technion.ac.il
George ApostolopoulosF5 / Shape SecurityVerified email at f5.com
Shu TaoGoogleVerified email at google.com
Zhi-Li ZhangDistinguished McKnight University Professor and Qwest Chair ProfessorVerified email at cs.umn.edu
Lixin GaoDistinguished Professor, Univ. of MassachusettsVerified email at ecs.umass.edu
Kumar N. SivarajanTejas NetworksVerified email at tejasnetworks.com
Ashwin SridharanUniversity of Pennsylvania, Sprint, AT&TVerified email at research.att.com
Inder GopalCarnegie Hill, Indian Inst of ScienceVerified email at carnegiehill.tech
Satish K. TripathiUnniversity at BuffaloVerified email at buffalo.edu
Mahmoud NaghshinehVice President, AI Impact and Partnerships, IBM ResearchVerified email at us.ibm.com
Scott ShenkerProfessor of Computer Science, UC BerkeleyVerified email at icsi.berkeley.edu
Phillip RogawayUC DavisVerified email at cs.ucdavis.edu
Rute C. Sofiafortiss GmbH - Industrial IoT Competence Center HeadVerified email at fortiss.org
Soumya SenUniversity of MinnesotaVerified email at umn.edu
Mihir BellareProfessor, Department of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at eng.ucsd.edu