Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Robert HeathCharles Lee Powell Chair in Wireless Communication, University of California, San DiegoVerified email at ucsd.edu
Rishabh SinghResearch Scientist, Google BrainVerified email at google.com
Christopher WagnerPurdue UniversityVerified email at purdue.edu
Milind KulkarniAssociate Professor of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
Thomas HenzingerIST AustriaVerified email at ist.ac.at
Swen JacobsCISPA Helmholtz Center for Information Security, Saarland Informatics CampusVerified email at cispa.saarland
Arjun RadhakrishnaMicrosoftVerified email at microsoft.com
Loris D'AntoniUniversity of California-San DiegoVerified email at ucsd.edu
Jyotirmoy V. DeshmukhAssociate Professor, University of Southern CaliforniaVerified email at usc.edu
Nageen HimayatVerified email at ieee.org
Thorsten TarrachAmazon Web ServicesVerified email at amazon.com
Bishwarup MondalIntelVerified email at intel.com
Swarat ChaudhuriProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
Pavol CernyProfessor, TU WienVerified email at tuwien.ac.at
Leonid RyzhykFelderaVerified email at feldera.com
Edmund ClarkeUniversity Professor Emeritus at Carnegie Mellon UniversityVerified email at cs.cmu.edu
Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Jan OtopUniversity of WrocławVerified email at cs.uni.wroc.pl
Brian L. EvansEngineering Foundation Professor, ECE, WNCG, University of Texas at AustinVerified email at ece.utexas.edu
Shengwei AnPurdue UniversityVerified email at purdue.edu