Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Stacey KuznetsovSchool of Arts, Media, and Engineering, Arizona State UniversityEmail verificata su asu.edu
- James PierceUniversity of Washington, Design; UC Berkeley, Center for Long-Term CybersecurityEmail verificata su uw.edu
- John CannyUniversity of California, BerkeleyEmail verificata su cs.berkeley.edu
- Sunyoung kimRutgers UniversityEmail verificata su rutgers.edu
- Cesar TorresAssistant Professor of Computer Science & Engineering @ The University of Texas at ArlingtonEmail verificata su uta.edu
- Jennifer MankoffUniversity of WashingtonEmail verificata su cs.washington.edu
- Molly Jane NicholasUniversity of California, BerkeleyEmail verificata su berkeley.edu
- Joanne LoElysian Labs, IncEmail verificata su elysianlabs.io
- Rundong TianUniversity of California, BerkeleyEmail verificata su berkeley.edu
- Sarah StermanAssistant Research Professor, UIUCEmail verificata su berkeley.edu
- Elizabeth GoodmanBerkeley, IntelEmail verificata su ischool.berkeley.edu
- Christine DierkResearch Scientist | Adobe ResearchEmail verificata su berkeley.edu
- Christopher MyersUC Berkeley, The Center for Information Technology Research in the Interest of Society (CITRIS)Email verificata su berkeley.edu
- Doris Jung-Lin LeeUniversity of California, BerkeleyEmail verificata su illinois.edu
- Mark D GrossProfessor of Computer Science, University of Colorado BoulderEmail verificata su colorado.edu
- Katherine W. SongUniversity of California, BerkeleyEmail verificata su berkeley.edu
- Marcus FothProfessor of Urban Informatics, QUT Design Lab, Queensland University of TechnologyEmail verificata su qut.edu.au
- Ken GoldbergProfessor, UC Berkeley and UCSFEmail verificata su berkeley.edu
- Matthew ChalmersUniversity of GlasgowEmail verificata su glasgow.ac.uk
- Jasper Tran O'LearyUniversity of WashingtonEmail verificata su cs.washington.edu