Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sean SmithProfessor of Computer Science, Dartmouth CollegeEmail verificata su cs.dartmouth.edu
- Meredith L. PattersonSpecial CircumstancesEmail verificata su special-circumstanc.es
- David KotzDartmouth CollegeEmail verificata su dartmouth.edu
- Travis GoodspeedEmail verificata su radiantmachines.com
- Ira Ray JenkinsDartmouth CollegeEmail verificata su cs.dartmouth.edu
- Ryan SpeersRiver Loop SecurityEmail verificata su riverloopsecurity.com
- Julian BangertGoogleEmail verificata su google.com
- Prashant AnantharamanSenior Security Researcher at Narf IndustriesEmail verificata su narfindustries.com
- Igor PakDepartment of Mathematics, UCLAEmail verificata su math.ucla.edu
- Gregory ContiPrincipal, Kopidion CybersecurityEmail verificata su usma.edu
- J Peter BradyGraduate Student, Dartmouth CollegeEmail verificata su cs.dartmouth.edu
- Javed AslamProfessor, Khoury College of Computer Sciences, Northeastern UniversityEmail verificata su ccs.neu.edu
- Cory CorneliusIntel LabsEmail verificata su intel.com
- Joshua BrodyAssociate Professor, Swarthmore CollegeEmail verificata su cs.swarthmore.edu
- Ralph WeischedelSenior Supvervisory Computer Scientist, USC Information Sciences InstituteEmail verificata su isi.edu
- Keren TanFacebook Inc.Email verificata su fb.com
- Daniela RusAndrew (1956) and Erna Viterbi Professor of Computer Science, MITEmail verificata su csail.mit.edu
- Ross KoppelUniversity of PennsylvaniaEmail verificata su sas.upenn.edu
- Sameed AliDartmouth CollegeEmail verificata su dartmouth.edu
- Jim BlytheComputer Scientist, USC Information Sciences InstituteEmail verificata su isi.edu