Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
VN VenkatakrishnanProfessor of Computer Science, University of Illinois at ChicagoVerified email at uic.edu
Sandeep BhatkarResearcherVerified email at talasecurity.io
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
C.R. RamakrishnanProfessor of Computer Science, Stony Brook UniversityVerified email at cs.stonybrook.edu
Mingwei ZhangSenior Software Engineer, GoogleVerified email at google.com
Lorenzo CavallaroUniversity College LondonVerified email at ucl.ac.uk
Weiqing SunProfessor, University of ToledoVerified email at utoledo.edu
Prateek SaxenaNational University of SingaporeVerified email at comp.nus.edu.sg
Alok TongaonkarData Scientist Director, Palo Alto NetworksVerified email at acm.org
Birhanu EsheteAssistant Professor, Computer Science, University of Michigan, DearbornVerified email at umich.edu
Niranjan HasabnisResearch Scientist, Intel LabsVerified email at intel.com
László SzekeresResearch Scientist, GoogleVerified email at google.com
Md Nahid HossainSoftware Engineer, OracleVerified email at cs.stonybrook.edu
Rui QiaoStony Brook UniversityVerified email at stonybrook.edu
Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
Scott D. StollerProfessor of Computer Science, Stony Brook UniversityVerified email at cs.stonybrook.edu
George CandeaAssociate Professor of Computer Science, EPFL (Lausanne, Switzerland)Verified email at epfl.ch
Riccardo PelizziGoogleVerified email at google.com
Dinakar DhurjatiStaff Engineer, Qualcomm Research Silicon ValleyVerified email at qti.qualcomm.com
Samik BasuProfessor of Computer Science, Iowa State UniversityVerified email at iastate.edu
Follow
R. Sekar
Professor of Computer Science, Stony Brook University
Verified email at cs.stonybrook.edu - Homepage