Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jeffrey S. FosterComputer Science, Tufts UniversityVerified email at tufts.edu
Thomas GilrayUniversity of Alabama at BirminghamVerified email at uab.edu
Jinseong JeonGoogleVerified email at google.com
Daniel VotipkaTufts UniversityVerified email at cs.tufts.edu
Michael ClarksonProvost's Teaching Fellow and Senior Lecturer of Computer Science, Cornell UniversityVerified email at cornell.edu
Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
Jeffrey A. VaughanPostdoc, UCLA, Computer ScienceVerified email at logicblox.com
Todd MillsteinProfessor of Computer Science, UCLAVerified email at cs.ucla.edu
Sidharth KumarAssistant Professor, University of Illinois at ChicagoVerified email at uic.edu
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Markus N RabeAugmentVerified email at augmentcode.com
Cesar SanchezResearch Professor, IMDEA Software InstituteVerified email at imdea.org
Subir BiswasProfessor of Electrical and Computer Engineering, Michigan State UniversityVerified email at egr.msu.edu
Charles OfriaMichigan State UniversityVerified email at cse.msu.edu
Eric TorngMichigan State UniversityVerified email at cse.msu.edu
Mahmoud TaghizadehMichigan State UniversityVerified email at google.com
Arash SahebolamriVerified email at syr.edu
Rock StevensUniversity of MarylandVerified email at umd.edu
Nikolaos KofinasGoogle.comVerified email at google.com
Ke FanUniversity of Illinois at ChicagoVerified email at uic.edu