Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Christos GkantsidisResearch, Microsoft ResearchVerified email at microsoft.com
- Nikolaos LaoutarisIMDEA Networks InstituteVerified email at imdea.org
- Ernst BiersackVerified email at eurecom.fr
- Meeyoung ChaMax Planck Institute for Security and Privacy (MPI-SP) and KAISTVerified email at mpi-sp.org
- Sue MoonSchool of Computing, KAISTVerified email at kaist.edu
- Vijay ErramilliPrincipal Data Scientist, SalesforceVerified email at salesforce.com
- Josep M. PujolChief Scientist at Cliqz (https://cliqz.com/)Verified email at cliqz.com
- Georgos SiganosSenior Scientist, Qatar Computing Research InstituteVerified email at qf.org.qa
- Jon CrowcroftUniversity of CambridgeVerified email at cl.cam.ac.uk
- Konstantina PapagiannakiMicrosoft, ACM Distinguished ScientistVerified email at microsoft.com
- Haewoon KwakLuddy School of Informatics, Computing, and Engineering, Indiana University BloomingtonVerified email at iu.edu
- Alberto Lopez ToledoFreshlyVerified email at freshly.com
- Laurent MassoulieInria, MSR-Inria Joint CentreVerified email at inria.fr
- Rajiv ChakravortyMakani NetworksVerified email at makaninetworks.com
- Suman BanerjeeUW-MadisonVerified email at cs.wisc.edu
- Yong-Yeol AhnProfessor of Informatics, Indiana University BloomingtonVerified email at iu.edu
- Rade StanojevicUberVerified email at uber.com
- Ravi SundaramProfessor, Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
- Bozidar RadunovicMicrosoft ResearchVerified email at microsoft.com
- Peter KeyConsultant researcherVerified email at acm.org