Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mark D. HillMicrosoft Partner Hardware Architect & University of Wisconsin-Madison Professor EmeritusVerified email at cs.wisc.edu
David A. WoodUniversity of Wisconsin, MadisonVerified email at cs.wisc.edu
Venkatesh AkellaProfessor of Electrical & Computer Engineering, University of California, DavisVerified email at ucdavis.edu
Ayaz AkramUniversity of California, DavisVerified email at ucdavis.edu
Marc OrrGoogleVerified email at cs.wisc.edu
Christopher NittaAssistant Professor of Teaching, University of California, DavisVerified email at ucdavis.edu
Jignesh M. PatelUniversity of WisconsinVerified email at cs.wisc.edu
Arkaprava BasuAssistant Professor at Indian Institute of Science (IISc)Verified email at iisc.ac.in
Steven K. ReinhardtMicrosoftVerified email at microsoft.com
Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisVerified email at ucdavis.edu
Matt FarrensUniversity of California, DavisVerified email at cs.ucdavis.edu
Lena E. OlsonGoogleVerified email at google.com
Pouya FotouhiUniversity of California at DavisVerified email at ucdavis.edu
S. J. B. YooUniversity of California, Davis; Lawrence Berkeley Laboratory; BellcoreVerified email at ucdavis.edu
Hongil YoonGoogleVerified email at cs.wisc.edu
Sanjeev TrikaGoogleVerified email at google.com
Sebastian WernerUC DavisVerified email at ucdavis.edu
Samuel T KingUniversity of California at DavisVerified email at ucdavis.edu
Tony NowatzkiUniversity of California, Los AngelesVerified email at cs.ucla.edu
Zhengrong WangUCLAVerified email at ucla.edu
Follow
Jason Lowe-Power
Assistant Professor, University of California, Davis
Verified email at ucdavis.edu - Homepage