Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
Qiqi YanGoogle IncVerified email at qiqiyan.com
Sergio MaffeisSenior Lecturer (Associate Professor) in Computer Security, Imperial College LondonVerified email at doc.ic.ac.uk
Úlfar ErlingssonArchitect at LaceworkVerified email at lacework.net
Ashish TiwariComputer Scientist, SRI International; Researcher MicrosoftVerified email at csl.sri.com
Arnar BirgissonGoogleVerified email at google.com
Stephane GaubertDirecteur de recherche, INRIA and CMAP, Ecole polytechniqueVerified email at inria.fr
Jasvir NagraGoogle IncVerified email at google.com
Mark S. MillerChief Scientist, AgoricVerified email at agoric.com
Joe Gibbs PolitzUniversity of California, San DiegoVerified email at eng.ucsd.edu
Eric GoubaultEcole PolytechniqueVerified email at cea.fr
David WuUniversity of Texas at AustinVerified email at cs.utexas.edu
Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Patrice GodefroidLaceworkVerified email at lacework.net
Sumit GulwaniPartner Research Manager, MicrosoftVerified email at microsoft.com
Aditya ParameswaranAssociate Professor, UC BerkeleyVerified email at berkeley.edu
Sudeep JuvekarUC Berkeley, 2007 - 2010Verified email at eecs.berkeley.edu
Supratik ChakrabortyDept. of Computer Science and Engineering, IIT BombayVerified email at iitb.ac.in
Martin AbadiResearch Scientist, Google, and Professor Emeritus, UC Santa CruzVerified email at cs.ucsc.edu
Lakulish AntaniVP (Engineering), Impulsonic, Inc.Verified email at cs.unc.edu