Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Venkatesh AkellaProfessor of Electrical & Computer Engineering, University of California, DavisVerified email at ucdavis.edu
- Mark D. HillUniversity of Wisconsin-Madison Professor EmeritusVerified email at cs.wisc.edu
- David A. WoodUniversity of Wisconsin, MadisonVerified email at cs.wisc.edu
- Ayaz AkramUniversity of California, DavisVerified email at ucdavis.edu
- Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisVerified email at lbl.gov
- Christopher NittaAssociate Professor of Teaching, University of California, DavisVerified email at ucdavis.edu
- S. J. Ben YooUniversity of California, Davis; Lawrence Berkeley Laboratory; BellcoreVerified email at ucdavis.edu
- Marc OrrGoogleVerified email at cs.wisc.edu
- Mahyar SamaniUniversity of California DavisVerified email at ucdavis.edu
- Arkaprava BasuAssociate Professor at Indian Institute of Science (IISc)Verified email at iisc.ac.in
- Steven K. ReinhardtMicrosoftVerified email at microsoft.com
- Anna GiannakouLawrence Berkeley National LabVerified email at lbl.gov
- Matt FarrensUniversity of California, DavisVerified email at cs.ucdavis.edu
- Pouya FotouhiUniversity of California at DavisVerified email at ucdavis.edu
- Marjan FariborzUniversity of California DavisVerified email at ucdavis.edu
- Jignesh M. PatelCarnegie Mellon UniversityVerified email at cmu.edu
- Bobby R. BruceUniversity of California, DavisVerified email at ucdavis.edu
- Sanjeev TrikaGoogleVerified email at google.com
- Hongil YoonGoogleVerified email at cs.wisc.edu
- Lena E. OlsonGoogleVerified email at google.com
Follow
Jason Lowe-Power
Associate Professor, University of California, Davis
Verified email at ucdavis.edu - Homepage