Get my own profile
Public access
View all4 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Marcus MagnorProfessor of Computer Science, TU Braunschweig, L3S Research CenterVerified email at cg.cs.tu-bs.de
Stefan GutheThreedyVerified email at threedy.io
Kentaro ToyamaUniversity of Michigan, School of InformationVerified email at umich.edu
Jeremy BirnholtzNorthwestern UniversityVerified email at northwestern.edu
Carl GutwinUniversity of SaskatchewanVerified email at cs.usask.ca
Agha Ali RazaAssistant Professor, Lahore University of Management Sciences (LUMS), Lahore, Pakistan.Verified email at lums.edu.pk
Richard J. AndersonProfessor of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
Michael GoeseleMeta Reality Labs ResearchVerified email at goesele.org
Florian SchaubUniversity of MichiganVerified email at umich.edu
Tawfiq AmmariAssistant Professor, Rutgers University School of Communication and InformationVerified email at umich.edu
Katharina KrombholzFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Hadia MajidLahore University of Management SciencesVerified email at lums.edu.pk
Mustafa NaseemClinical Assistant Professor, University of MichiganVerified email at umich.edu