Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Robert HeathLampe Distinguished Professor, North Carolina State UniversityVerified email at ncsu.edu
Rishabh SinghResearch Scientist, Google BrainVerified email at google.com
Thomas HenzingerIST AustriaVerified email at ist.ac.at
Loris D'AntoniUniversity of Wisconsin, MadisonVerified email at cs.wisc.edu
Jyotirmoy V. DeshmukhAssistant Professor, University of Southern CaliforniaVerified email at usc.edu
Nageen HimayatVerified email at ieee.org
Bishwarup MondalIntelVerified email at intel.com
Thorsten TarrachAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Arjun RadhakrishnaMicrosoftVerified email at microsoft.com
Milind KulkarniAssociate Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
Christopher WagnerPurdue UniversityVerified email at purdue.edu
Swarat ChaudhuriUniversity of Texas at AustinVerified email at cs.utexas.edu
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Brian L. EvansEngineering Foundation Professor, ECE, WNCG, University of Texas at AustinVerified email at ece.utexas.edu
Pavol CernyProfessor, TU WienVerified email at tuwien.ac.at
Leonid RyzhykVMware ResearchVerified email at vmware.com
Edmund ClarkeUniversity Professor Emeritus at Carnegie Mellon UniversityVerified email at cs.cmu.edu
Jan OtopUniversity of WrocławVerified email at cs.uni.wroc.pl
Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Shengwei AnPurdue UniversityVerified email at purdue.edu