Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Elsa L GunterResearch Associate Professor, University of Illinois at Urbana - ChampaignVerified email at illinois.edu
Steve ZdancewicProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Joseph DeviettiAssistant Professor of Computer & Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Yuanfeng PengGoogle / UPennVerified email at cis.upenn.edu
Andrew W. AppelProfessor of Computer Science, Princeton UniversityVerified email at princeton.edu
Lennart BeringerPrinceton UniversityVerified email at cs.princeton.edu
Karen M. FeighProfessor of Cognitive Engineering, Georgia Institute of TechnologyVerified email at gatech.edu
Matthew L. BoltonAssociate Professor of Systems Engineering at the University of VirginiaVerified email at buffalo.edu
Ellen J. BassProfessor, Drexel UniversityVerified email at drexel.edu
Viktor VafeiadisMax Planck Institute for Software Systems (MPI-SWS), Saarland Informatics Campus (SIC)Verified email at mpi-sws.org
Chung-Kil HurSeoul National UniversityVerified email at sf.snu.ac.kr
Jeehoon KangAssistant Professor of KAIST School of ComputingVerified email at kaist.ac.kr
Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Yao LiPortland State UniversityVerified email at pdx.edu
Li-yao XiaUniversity of EdinburghVerified email at ed.ac.uk
Yishuai LiEngineer II, Alibaba GroupVerified email at alibaba-inc.com
Aleksey NoginHead of Research, Red Balloon SecurityVerified email at redballoonsecurity.com
Michael D. AdamsUniversity of UtahVerified email at utah.edu
santiago cuellarPhD, Princeton UniversityVerified email at princeton.edu
Nick GiannarakisAmazon Web ServicesVerified email at wisc.edu
Follow
William Mansky
Assistant Professor, University of Illinois at Chicago
Verified email at uic.edu - Homepage