Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
James LandayProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Anthony LaMarcaIntel LabsVerified email at intel.com
Beverly HarrisonMicrosoftVerified email at microsoft.com
Jeffrey HightowerGoogleVerified email at acm.org
Predrag KlasnjaAssociate Professor, School of Information, University of MichiganVerified email at umich.edu
Jon E. FroehlichProfessor, Allen School of Computer Science, University of WashingtonVerified email at cs.uw.edu
David W. McDonaldProfessor, University of WashingtonVerified email at u.washington.edu
Mike Y. Chen - 陳彥仰Professor of Computer Science, National Taiwan UniversityVerified email at csie.ntu.edu.tw
Robert W. ReederSenior Research Scientist, GoogleVerified email at google.com
Tanzeem ChoudhuryProfessor, Computing and Information Science, Cornell TechVerified email at cornell.edu
Ian SmithProfessor of Geotechnical EngineeringVerified email at hw.ac.uk
Patrick Gage KelleyGoogle, University of New Mexico, Carnegie Mellon UniversityVerified email at google.com
Julie A. KientzProfessor, University of WashingtonVerified email at uw.edu
Timothy SohnGoogleVerified email at google.com
Kurt ThomasResearch Scientist @ GoogleVerified email at google.com
James ScottMicrosoftVerified email at acm.org
Elizabeth ChurchillGoogleVerified email at acm.org
Elie BurszteinSecurity and anti-abuse research lead, GoogleVerified email at google.com
Eun Kyoung ChoeUniversity of MarylandVerified email at umd.edu
Bill SchilitGoogle ResearchVerified email at google.com