Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Stacey KuznetsovSchool of Arts, Media, and Engineering, Arizona State UniversityVerified email at asu.edu
James PierceUniversity of Washington, Design; UC Berkeley, Center for Long-Term CybersecurityVerified email at uw.edu
John CannyUniversity of California, BerkeleyVerified email at cs.berkeley.edu
Sunyoung kimRutgers UniversityVerified email at rutgers.edu
Jennifer MankoffUniversity of WashingtonVerified email at cs.washington.edu
Cesar TorresAssistant Professor of Computer Science & Engineering @ The University of Texas at ArlingtonVerified email at uta.edu
Joanne LoElysian Labs, IncVerified email at elysianlabs.io
Molly Jane NicholasUniversity of California, BerkeleyVerified email at berkeley.edu
Rundong TianUniversity of California, BerkeleyVerified email at berkeley.edu
Elizabeth GoodmanBerkeley, IntelVerified email at ischool.berkeley.edu
Christopher MyersUC Berkeley, The Center for Information Technology Research in the Interest of Society (CITRIS)Verified email at berkeley.edu
Christine DierkResearch Scientist | Adobe ResearchVerified email at berkeley.edu
Sarah StermanAssistant Research Professor, UIUCVerified email at berkeley.edu
Doris Jung-Lin LeePhD Student, University of California, BerkeleyVerified email at illinois.edu
Marcus FothProfessor of Urban Informatics, QUT Design Lab, Queensland University of TechnologyVerified email at qut.edu.au
Mark D GrossProfessor of Computer Science, University of Colorado BoulderVerified email at colorado.edu
Paul M. AokiGoogle; Intel Research; Xerox PARC; U.C. BerkeleyVerified email at acm.org
Ken GoldbergProfessor, UC Berkeley and UCSFVerified email at berkeley.edu
Matthew ChalmersUniversity of GlasgowVerified email at glasgow.ac.uk
Allison WoodruffGoogleVerified email at google.com