Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Steve ZdancewicProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Elsa L GunterResearch Associate Professor, University of Illinois at Urbana - ChampaignVerified email at illinois.edu
Lennart BeringerVerified email at pm.me
Joseph DeviettiAssistant Professor of Computer & Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Yuanfeng PengGoogle / UPennVerified email at cis.upenn.edu
Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Yao LiPortland State UniversityVerified email at pdx.edu
Yishuai LiEngineer II, Alibaba CloudVerified email at alibaba-inc.com
Andrew W. AppelProfessor of Computer Science, Princeton UniversityVerified email at princeton.edu
Jeehoon KangKAIST School of ComputingVerified email at kaist.ac.kr
Viktor VafeiadisMax Planck Institute for Software Systems (MPI-SWS), Saarland Informatics Campus (SIC)Verified email at mpi-sws.org
Chung-Kil HurSeoul National UniversityVerified email at sf.snu.ac.kr
Karen M. FeighProfessor of Cognitive Engineering, Georgia Institute of TechnologyVerified email at gatech.edu
Matthew L. BoltonAssociate Professor of Systems Engineering at the University of VirginiaVerified email at virginia.edu
Ellen J. BassProfessor, Drexel UniversityVerified email at drexel.edu
Aleksey NoginHead of Research, Red Balloon SecurityVerified email at redballoonsecurity.com
santiago cuellarPhD, Princeton UniversityVerified email at princeton.edu
Nick GiannarakisAmazon Web ServicesVerified email at amazon.com
Jean-Marie MadiotINRIAVerified email at inria.fr
Michael D. AdamsUniversity of UtahVerified email at utah.edu
Follow
William Mansky
Assistant Professor, University of Illinois at Chicago
Verified email at uic.edu - Homepage