Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Amir HoumansadrUniversity of Massachusetts AmherstEmail verificata su cs.umass.edu
- Prateek MittalProfessor, Princeton UniversityEmail verificata su princeton.edu
- Matthew CaesarProfessor of Computer Science, University of IllinoisEmail verificata su illinois.edu
- Anupam DasNorth Carolina State UniversityEmail verificata su ncsu.edu
- David WagnerProfessor of Computer Science, UC BerkeleyEmail verificata su cs.berkeley.edu
- Sonia JahidDepartment of Computer Science, UIUCEmail verificata su illinois.edu
- Negar KiyavashÉcole polytechnique fédérale de Lausanne (EPFL)Email verificata su epfl.ch
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Eric BrewerGoogle and UC BerkeleyEmail verificata su cs.berkeley.edu
- Shishir NagarajaProfessor of Cybersecurity, University of NewcastleEmail verificata su newcastle.ac.uk
- George DanezisMysten Labs & University College LondonEmail verificata su ucl.ac.uk
- Xun GongUniversity of IllinoisEmail verificata su illinois.edu
- Kazuhiro MinamiProfessor, Institute of Statistical MathematicsEmail verificata su ism.ac.jp
- Qiyan "Chiyan" WangPrincipal Research Engineer at SymantecEmail verificata su symantec.com
- Qi WangUniversity of Illinois Urbana-ChampaignEmail verificata su illinois.edu
- Shirin NilizadehUniversity of Texas at ArlingtonEmail verificata su uta.edu
- Matt WelshGoogleEmail verificata su mdw.la
- David CULLERUniversity of California, BerkeleyEmail verificata su berkeley.edu
- Giang NguyenComputer Science Graduate Student, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Chi-Yao HongGoogleEmail verificata su google.com
Segui
Nikita Borisov
Professor of Electrical and Computer Engineering, University of Illinois at Urbana
Email verificata su illinois.edu - Home page