Get my own profile
Public access
View all5 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Sriram RajamaniMicrosoft Research Verified email at microsoft.com
James R LarusProfessor Emeritus, EPFLVerified email at larusstone.org
Nachiappan NagappanFacebookVerified email at fb.com
Shuvendu LahiriSenior Principal Researcher, Microsoft ResearchVerified email at microsoft.com
Steve HodgesLancaster University 📄= pub; 💡= patent ; 🏆/🏅= awardVerified email at lancaster.ac.uk
Shaz QadeerMicrosoftVerified email at microsoft.com
Madanlal MusuvathiMicrosoft ResearchVerified email at microsoft.com
Fred DouglisPeraton LabsVerified email at Peratonlabs.com
Joe FinneyLancaster UniversityVerified email at comp.lancs.ac.uk
Todd MillsteinProfessor of Computer Science, UCLAVerified email at cs.ucla.edu
James DevineMicrosoftVerified email at microsoft.com
Stephen G. EickVerified email at kscopeinc.com
Byron CookProfessor of Computer Science, UCL, AmazonVerified email at cs.ucl.ac.uk
Rupak MajumdarMPI for Software SystemsVerified email at mpi-sws.org
Andreas PodelskiProfessor of Computer Science, Freiburg UniversityVerified email at informatik.uni-freiburg.de
Sebastian BurckhardtMicrosoft ResearchVerified email at microsoft.com
Mooly SagivTel Aviv UniversityVerified email at acm.org
Peter J. DanielsenVerified email at uwalumni.com
Thomas RepsJ. Barkley Rosser Professor & Rajiv and Ritu Batra Chair Emeritus, CS Dept., Univ. of WisconsinVerified email at cs.wisc.edu
Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityVerified email at cispa.de