Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jeffrey S. FosterComputer Science, Tufts UniversityVerified email at tufts.edu
Jinseong JeonGoogleVerified email at google.com
Thomas GilrayUniversity of Alabama at BirminghamVerified email at uab.edu
Michael ClarksonProvost's Teaching Fellow and Senior Lecturer of Computer Science, Cornell UniversityVerified email at cornell.edu
Daniel VotipkaTufts UniversityVerified email at cs.tufts.edu
Jeffrey A. VaughanPostdoc, UCLA, Computer ScienceVerified email at logicblox.com
Todd MillsteinProfessor of Computer Science, UCLAVerified email at cs.ucla.edu
Michelle L. MazurekAssociate Professor, University of MarylandVerified email at umd.edu
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Markus N RabeStartupVerified email at augmentcode.com
Cesar SanchezAssociate Research Professor, IMDEA Software InstituteVerified email at imdea.org
Sidharth KumarAssistant Professor, University of Illinois at ChicagoVerified email at uic.edu
Subir BiswasProfessor of Electrical and Computer Engineering, Michigan State UniversityVerified email at egr.msu.edu
Charles OfriaMichigan State UniversityVerified email at cse.msu.edu
Eric TorngMichigan State UniversityVerified email at cse.msu.edu
Mahmoud TaghizadehMichigan State UniversityVerified email at google.com
Rock StevensUniversity of MarylandVerified email at umd.edu
Nikolaos KofinasGoogle.comVerified email at google.com
Ke FanUniversity of Alabama at BirminghamVerified email at uab.edu
David DaraisGalois, Inc.Verified email at galois.com