Crea il mio profilo
Accesso pubblico
Visualizza tutto20 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyEmail verificata su berkeley.edu
- Deirdre K. MulliganUC BerkeleyEmail verificata su berkeley.edu
- James PierceUniversity of Washington, Design; UC Berkeley, Center for Long-Term CybersecurityEmail verificata su uw.edu
- Qian YangCornell UniversityEmail verificata su cornell.edu
- Sarah FoxCarnegie Mellon UniversityEmail verificata su cmu.edu
- John ChuangProfessor, UC Berkeley School of InformationEmail verificata su ischool.berkeley.edu
- Noura HowellDigital Media, Georgia TechEmail verificata su gatech.edu
- Vera KhovanskayaUC San DiegoEmail verificata su ucsd.edu
- J.D. Zamfirescu-PereiraUC BerkeleyEmail verificata su alum.mit.edu
- Bjoern HartmannAssociate Professor of EECS, University of California, BerkeleyEmail verificata su eecs.berkeley.edu
- Steven J. JacksonProfessor of Information Science and Science and Technology Studies, Cornell UniversityEmail verificata su cornell.edu
- Joshua KrollNaval Postgraduate SchoolEmail verificata su nps.edu
- Nitin KohliUC BerkeleyEmail verificata su berkeley.edu
- BF SchulteEmail verificata su ucl.ac.uk
- Marie Louise Juul SøndergaardPostdoctoral Researcher, AHO The Oslo School of Architecture and DesignEmail verificata su aho.no
- Chris ElsdenChancellor's Fellow, University of EdinburghEmail verificata su ed.ac.uk
- Franchesca SpektorPhD Student, Carnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Phoebe SengersProfessor, Information Science and Science & Technology Studies, CornellEmail verificata su infosci.cornell.edu
- Robert SodenAssistant Professor, University of TorontoEmail verificata su cs.toronto.edu
- Laura DevendorfUniversity of Colorado BoulderEmail verificata su colorado.edu