Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yanyan ZhuangUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
John H. HartmanAssociate Professor of Computer Science, University of ArizonaVerified email at cs.arizona.edu
Ivan BeschastnikhUniversity of British ColumbiaVerified email at cs.ubc.ca
Santiago Torres-AriasAssistant Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
Trishank Karthik KuppusamyIndependentVerified email at nyu.edu
Keith RossLeonard J. Shustek Professor of Computer Science, Dept. of Computer Science and Engineering, NYUVerified email at nyu.edu
Justin SamuelUniversity of California, BerkeleyVerified email at cs.berkeley.edu
Sai Teja PeddintiGoogle Inc.Verified email at google.com
Reza CurtmolaProfessor of Computer Science, New Jersey Institute of Technology (NJIT)Verified email at njit.edu
Martin K. YehAssociate Professor of Information Sciences and Technology, Penn State UniversityVerified email at psu.edu
Arvind KrishnamurthyShort-Dooley Professor, Univ. of WashingtonVerified email at cs.washington.edu
Thomas AndersonWarren Francis and Wilma Kolm Bradley Chair, CSE, University of WashingtonVerified email at cs.washington.edu
Dan GopsteinNYUVerified email at nyu.edu
Stephen KobourovProfessor of Computer Science, University of ArizonaVerified email at cs.arizona.edu
Rodrigo FonsecaPrincipal Researcher, Microsoft ResearchVerified email at microsoft.com
Yuriy BrunManning College of Information and Computer Sciences, University of Massachusetts AmherstVerified email at cs.umass.edu
Jeff RasleyMicrosoftVerified email at microsoft.com
Ismail KhoffiSecurity-/Privacy Engineer, EPFL - I&C - DEDISVerified email at epfl.ch
Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
Kirill NikitinNew York Genome Center & Columbia UniversityVerified email at cornell.edu