Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
VN VenkatakrishnanProfessor of Computer Science, University of Illinois at ChicagoVerified email at uic.edu
Sandeep BhatkarResearcherVerified email at talasecurity.io
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
C.R. RamakrishnanProfessor of Computer Science, Stony Brook UniversityVerified email at cs.stonybrook.edu
Mingwei ZhangSenior Software Engineer, GoogleVerified email at google.com
Lorenzo CavallaroUniversity College LondonVerified email at ucl.ac.uk
Weiqing SunProfessor, University of ToledoVerified email at utoledo.edu
Alok TongaonkarData Scientist Director, Palo Alto NetworksVerified email at acm.org
László SzekeresResearch Scientist, GoogleVerified email at google.com
Prateek SaxenaNational University of SingaporeVerified email at comp.nus.edu.sg
Niranjan HasabnisResearch Scientist, Intel LabsVerified email at intel.com
Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
Birhanu EsheteAssistant Professor, Computer Science, University of Michigan, DearbornVerified email at umich.edu
Rui QiaoStony Brook UniversityVerified email at stonybrook.edu
Md Nahid HossainSoftware Engineer, OracleVerified email at cs.stonybrook.edu
George CandeaAssociate Professor of Computer Science, EPFL (Lausanne, Switzerland)Verified email at epfl.ch
Scott D. StollerProfessor of Computer Science, Stony Brook UniversityVerified email at cs.stonybrook.edu
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Riccardo PelizziGoogleVerified email at google.com
Dinakar DhurjatiStaff Engineer, Qualcomm Research Silicon ValleyVerified email at qti.qualcomm.com
Follow
R. Sekar
Professor of Computer Science, Stony Brook University
Verified email at cs.stonybrook.edu - Homepage