From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Critical Look at Decentralized Personal Data Architectures, , , , и . CoRR, (2012)Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites., , , , , , и . PACMHCI, 3 (CSCW): 81:1-81:32 (2019)Case for 5G-aware video streaming applications., , , , , и . 5G-MeMZ@SIGCOMM, стр. 27-34. ACM, (2021)A variegated look at 5G in the wild: performance, power, and QoE implications., , , , , , , , , и 2 other автор(ы). SIGCOMM, стр. 610-625. ACM, (2021)Formal Barriers to Longest-Chain Proof-of-Stake Protocols., , , и . EC, стр. 459-473. ACM, (2019)Mitigating dataset harms requires stewardship: Lessons from 1000 papers., , и . NeurIPS Datasets and Benchmarks, (2021)De-anonymizing Social Networks., и . SP, стр. 173-187. IEEE Computer Society, (2009)REVISE: A Tool for Measuring and Mitigating Bias in Visual Datasets., , и . ECCV (3), том 12348 из Lecture Notes in Computer Science, стр. 733-751. Springer, (2020)What Happened to the Crypto Dream?, Part 2.. IEEE Secur. Priv., 11 (3): 68-71 (2013)Obfuscated databases and group privacy., и . CCS, стр. 102-111. ACM, (2005)