Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- John HatcliffUniversity Distinguished Professor, Department of Computing and Information Sciences, Kansas StateEmail verificata su ksu.edu
- Matthew DwyerUniversity of VirginiaEmail verificata su virginia.edu
- Ganesan RamalingamMicrosoft Research IndiaEmail verificata su microsoft.com
- Kapil VaswaniMicrosoft ResearchEmail verificata su microsoft.com
- Georg JungEnergyVilleEmail verificata su acm.org
- Daniel AndresenProfessor of Computer Science, Kansas State UniversityEmail verificata su ksu.edu
- Sriram RajamaniMicrosoft Research Email verificata su microsoft.com
- Joydeep MitraNortheastern UniversityEmail verificata su northeastern.edu
- David LoProfessor of Computer Science, Singapore Management UniversityEmail verificata su smu.edu.sg
- Anindya BanerjeeProfessor, IMDEA Software InstituteEmail verificata su imdea.org
- Xinming (Simon) OuProfessor of Computer Science and Engineering, University of South FloridaEmail verificata su usf.edu
- Doina CarageaKansas State UniversityEmail verificata su ksu.edu
- Sankardas RoyBowling Green State UniversityEmail verificata su bgsu.edu
- Jyotirmoy V. DeshmukhAssociate Professor, University of Southern CaliforniaEmail verificata su usc.edu
- Aniruddha GokhaleVanderbilt UniversityEmail verificata su vanderbilt.edu
- Douglas SchmidtCornelius Vanderbilt Professor of Computer Science at Vanderbilt UniversityEmail verificata su vanderbilt.edu
- Thomas ZimmermannSr. Principal Researcher at Microsoft Research, RedmondEmail verificata su microsoft.com
- Christian BirdMicrosoft ResearchEmail verificata su microsoft.com
- Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityEmail verificata su cispa.de
- Nachiappan NagappanFacebookEmail verificata su fb.com