Get my own profile
Public access
View all51 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Kay ConnellyProfessor of Computer Science, Associate Dean for Research, Indiana UniversityVerified email at indiana.edu
- Kalpana ShankarUniversity College DublinVerified email at ucd.ie
- Debin LiuSecurity ScientistVerified email at indiana.edu
- Kevin BentonIndiana UniversityVerified email at indiana.edu
- Timothy KelleyIndiana UniversityVerified email at indiana.edu
- Pablo MorianoResearch Scientist, Oak Ridge National LaboratoryVerified email at ornl.gov
- Kelly CaineProfessor, Clemson UniversityVerified email at clemson.edu
- Jim BlytheComputer Scientist, USC Information Sciences InstituteVerified email at isi.edu
- Zheng DongIndiana UniversityVerified email at indiana.edu
- Prashanth RajivanUniversity of WashingtonVerified email at uw.edu
- Joshua StreiffIndiana UniversityVerified email at iu.edu
- Vafa AndalibiSecurity Software EngineerVerified email at google.com
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
- Marvin SirbuCarnegie Mellon UniversityVerified email at cmu.edu
- Jacob AbbottPostdoctoral Fellow, Indiana UniversityVerified email at indiana.edu
- Apu KapadiaProfessor of Computer Science, Indiana UniversityVerified email at indiana.edu
- William R. HazlewoodAmazonVerified email at indiana.edu
- Hilda HadanUniversity of WaterlooVerified email at uwaterloo.ca
- Catherine WolframProfessor of Energy Economics, MIT SloanVerified email at mit.edu
- Dr. Beth Ann Walker, PhD, MS, OTR, F...Associate Professor, University of IndianapolisVerified email at uindy.edu
Follow
L Jean Camp
Professor of Informatics and Computer Science, Luddy School, Indiana University
Verified email at indiana.edu - Homepage