Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Stacey KuznetsovSchool of Arts, Media, and Engineering, Arizona State UniversityVerified email at asu.edu
James PierceUniversity of Washington, Design; UC Berkeley, Center for Long-Term CybersecurityVerified email at uw.edu
John CannyUniversity of California, BerkeleyVerified email at cs.berkeley.edu
Sunyoung kimRutgers UniversityVerified email at rutgers.edu
Cesar TorresAssistant Professor of Computer Science & Engineering @ The University of Texas at ArlingtonVerified email at uta.edu
Joanne LoElysian Labs, IncVerified email at elysianlabs.io
Jennifer MankoffUniversity of WashingtonVerified email at cs.washington.edu
Molly Jane NicholasUniversity of California, BerkeleyVerified email at berkeley.edu
Katherine W. SongDelft University of TechnologyVerified email at tudelft.nl
Rundong TianUniversity of California, BerkeleyVerified email at berkeley.edu
Sarah StermanAssistant Research Professor, UIUCVerified email at berkeley.edu
Elizabeth GoodmanBerkeley, IntelVerified email at ischool.berkeley.edu
Christine DierkResearch Scientist | Adobe ResearchVerified email at berkeley.edu
Doris Jung-Lin LeeUniversity of California, BerkeleyVerified email at illinois.edu
Christopher MyersUC Berkeley, The Center for Information Technology Research in the Interest of Society (CITRIS)Verified email at berkeley.edu
Mark D GrossProfessor of Computer Science, University of Colorado BoulderVerified email at colorado.edu
Marcus FothProfessor of Urban Informatics, School of Design, Queensland University of TechnologyVerified email at qut.edu.au
Ron WakkaryProfessor, Simon Fraser University and Eindhoven University of TechnologyVerified email at sfu.ca
Jasper Tran O'LearyUniversity of WashingtonVerified email at cs.washington.edu
Ken GoldbergProfessor, UC Berkeley and UCSFVerified email at berkeley.edu