Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
James LandayProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Anthony LaMarcaIntel LabsVerified email at intel.com
Beverly HarrisonMicrosoftVerified email at microsoft.com
Jeffrey HightowerGoogleVerified email at acm.org
Predrag KlasnjaAssociate Professor, School of Information, University of MichiganVerified email at umich.edu
Jon E. FroehlichAssociate Professor, CSE, University of WashingtonVerified email at cs.uw.edu
David W. McDonaldProfessor, University of WashingtonVerified email at u.washington.edu
Mike Y. Chen - 陳彥仰Professor of Computer Science, National Taiwan UniversityVerified email at csie.ntu.edu.tw
Robert W. ReederSenior Research Scientist, GoogleVerified email at google.com
Tanzeem ChoudhuryProfessor, Computing and Information Science, Cornell TechVerified email at cornell.edu
Ian SmithProfessor of Geotechnical EngineeringVerified email at hw.ac.uk
Timothy SohnGoogleVerified email at google.com
Patrick Gage KelleyGoogle, University of New Mexico, Carnegie Mellon UniversityVerified email at google.com
Julie A. KientzProfessor, University of WashingtonVerified email at uw.edu
James ScottMicrosoftVerified email at acm.org
Kurt ThomasResearch Scientist @ GoogleVerified email at google.com
Elizabeth ChurchillGoogleVerified email at acm.org
Eun Kyoung ChoeUniversity of MarylandVerified email at umd.edu
Elie BurszteinSecurity and anti-abuse research lead, GoogleVerified email at google.com
Bill SchilitGoogle ResearchVerified email at google.com