Get my own profile
Public access
View all51 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Kay ConnellyProfessor of Computer Science, Associate Dean for Research, Indiana UniversityVerified email at indiana.edu
Kalpana ShankarUniversity College DublinVerified email at ucd.ie
Debin LiuSecurity ScientistVerified email at indiana.edu
Kevin BentonIndiana UniversityVerified email at indiana.edu
Timothy KelleyIndiana UniversityVerified email at indiana.edu
Pablo MorianoResearch Scientist, Oak Ridge National LaboratoryVerified email at ornl.gov
Kelly CaineProfessor, Clemson UniversityVerified email at clemson.edu
Jim BlytheComputer Scientist, USC Information Sciences InstituteVerified email at isi.edu
Zheng DongIndiana UniversityVerified email at indiana.edu
Prashanth RajivanUniversity of WashingtonVerified email at uw.edu
Vafa AndalibiSenior Security SWEVerified email at google.com
Joshua StreiffIndiana UniversityVerified email at iu.edu
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
Marvin SirbuCarnegie Mellon UniversityVerified email at cmu.edu
Jacob AbbottPostdoctoral Fellow, Indiana UniversityVerified email at indiana.edu
Apu KapadiaProfessor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
William R. HazlewoodAmazonVerified email at indiana.edu
Hilda HadanUniversity of WaterlooVerified email at uwaterloo.ca
Catherine WolframProfessor of Energy Economics, MIT SloanVerified email at mit.edu
Ben JelenAssistant Professor of CS and Software Engineering; Rose-Hulman Institute of TechnologyVerified email at rose-hulman.edu
Follow
L Jean Camp
Professor of Informatics and Computer Science, Luddy School, Indiana University
Verified email at indiana.edu - Homepage