Get my own profile
Public access
View all23 articles
1 article
available
not available
Based on funding mandates
Co-authors
Marianne WinslettDepartment of Computer Science, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Apu KapadiaProfessor of Computer Science, Indiana UniversityVerified email at indiana.edu
William C. Garrison IIIDepartment of Computer Science, University of PittsburghVerified email at cs.pitt.edu
Ting YuQatar Computing Research Institute (QCRI)Verified email at ncsu.edu
Panos K. ChrysanthisProfessor of Computer Science, University of PittsburghVerified email at cs.pitt.edu
Jacob T. BiehlUniversity of PittsburghVerified email at pitt.edu
Sameer PatilAssociate Professor, Kahlert School of Computing, University of UtahVerified email at utah.edu
Kazuhiro MinamiProfessor, Institute of Statistical MathematicsVerified email at ism.ac.jp
Alexandros LabrinidisProfessor of Computer Science, University of PittsburghVerified email at cs.pitt.edu
Cory ThomaPhD. Student, University of PittsburghVerified email at cs.pitt.edu
Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaVerified email at illinois.edu
Greg NorcieIndiana UniversityVerified email at indiana.edu
Von WelchCybersecurity Researcher, Indiana UniversityVerified email at indiana.edu
Roberto HoyleAssistant Professor, Oberlin CollegeVerified email at oberlin.edu
Eleanor RieffelNASA Ames Research CenterVerified email at nasa.gov
Daniel MosseProfessor of Computer Science, University of PittsburghVerified email at cs.pitt.edu
Ragib HasanAssociate Professor of Computer Science, University of Alabama at BirminghamVerified email at uab.edu
Follow
Adam J. Lee
Professor of Computer Science, University of Pittsburgh
Verified email at pitt.edu - Homepage