Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jeffrey S. FosterComputer Science, Tufts UniversityVerified email at cs.tufts.edu
Jinseong JeonGoogleVerified email at google.com
Jeffrey A. VaughanPostdoc, UCLA, Computer ScienceVerified email at logicblox.com
Todd MillsteinProfessor of Computer Science, UCLAVerified email at cs.ucla.edu
Michael ClarksonLecturer in Computer Science, Cornell UniversityVerified email at cornell.edu
Daniel VotipkaTufts UniversityVerified email at cs.tufts.edu
Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
Thomas GilrayUniversity of Alabama at BirminghamVerified email at uab.edu
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Markus N RabeGoogleVerified email at google.com
Cesar SanchezAssociate Research Professor, IMDEA Software InstituteVerified email at imdea.org
Subir BiswasProfessor of Electrical and Computer Engineering, Michigan State UniversityVerified email at egr.msu.edu
Charles OfriaMichigan State UniversityVerified email at cse.msu.edu
Eric TorngMichigan State UniversityVerified email at cse.msu.edu
Mahmoud TaghizadehMichigan State UniversityVerified email at google.com
Rock StevensUniversity of MarylandVerified email at umd.edu
Nikolaos KofinasGoogle.comVerified email at google.com
David DaraisAssistant Professor, University of VermontVerified email at uvm.edu
Kyle HeadleyUniversity of Alabama at BirminghamVerified email at uab.edu
Narayana ReddyAssistant ManagerVerified email at apcotex.com
Kristopher Micinski
Verified email at syr.edu - Homepage