Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jeffrey S. FosterComputer Science, Tufts UniversityVerified email at tufts.edu
- Thomas GilrayUniversity of Alabama at BirminghamVerified email at uab.edu
- Jinseong JeonGoogleVerified email at google.com
- Daniel VotipkaTufts UniversityVerified email at cs.tufts.edu
- Michael ClarksonProvost's Teaching Fellow and Senior Lecturer of Computer Science, Cornell UniversityVerified email at cornell.edu
- Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
- Jeffrey A. VaughanPostdoc, UCLA, Computer ScienceVerified email at logicblox.com
- Todd MillsteinProfessor of Computer Science, UCLAVerified email at cs.ucla.edu
- Sidharth KumarAssistant Professor, University of Illinois at ChicagoVerified email at uic.edu
- Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Markus N RabeAugmentVerified email at augmentcode.com
- Cesar SanchezProfessor, IMDEA Software InstituteVerified email at imdea.org
- Subir BiswasProfessor of Electrical and Computer Engineering, Michigan State UniversityVerified email at egr.msu.edu
- Charles OfriaMichigan State UniversityVerified email at cse.msu.edu
- Eric TorngMichigan State UniversityVerified email at cse.msu.edu
- Mahmoud TaghizadehMichigan State UniversityVerified email at google.com
- Arash SahebolamriVerified email at syr.edu
- Rock StevensUniversity of MarylandVerified email at umd.edu
- Nikolaos KofinasGoogle.comVerified email at google.com
- Ke FanUniversity of Illinois at ChicagoVerified email at uic.edu