Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jeffrey S. FosterComputer Science, Tufts UniversityEmail verificata su tufts.edu
- Thomas GilrayUniversity of Alabama at BirminghamEmail verificata su uab.edu
- Jinseong JeonGoogleEmail verificata su google.com
- Daniel VotipkaTufts UniversityEmail verificata su cs.tufts.edu
- Michael ClarksonProvost's Teaching Fellow and Senior Lecturer of Computer Science, Cornell UniversityEmail verificata su cornell.edu
- Michelle L. MazurekAssociate Professor, University of MarylandEmail verificata su umd.edu
- Jeffrey A. VaughanPostdoc, UCLA, Computer ScienceEmail verificata su logicblox.com
- Todd MillsteinProfessor of Computer Science, UCLAEmail verificata su cs.ucla.edu
- Sidharth KumarAssistant Professor, University of Illinois at ChicagoEmail verificata su uic.edu
- Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Markus N RabeAugmentEmail verificata su augmentcode.com
- Cesar SanchezResearch Professor, IMDEA Software InstituteEmail verificata su imdea.org
- Subir BiswasProfessor of Electrical and Computer Engineering, Michigan State UniversityEmail verificata su egr.msu.edu
- Charles OfriaMichigan State UniversityEmail verificata su cse.msu.edu
- Eric TorngMichigan State UniversityEmail verificata su cse.msu.edu
- Mahmoud TaghizadehMichigan State UniversityEmail verificata su google.com
- Rock StevensUniversity of MarylandEmail verificata su umd.edu
- Nikolaos KofinasGoogle.comEmail verificata su google.com
- Ke FanUniversity of Illinois at ChicagoEmail verificata su uic.edu
- Yihao SunSyracuse UniversityEmail verificata su syr.edu