Author of the publication

On the Design of a Tool for Controlling Privacy in the WWW.

, , , , and . Workshop on Information Integration on the Web, page 96-102. (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hierarchical characterization of a live streaming media workload., , , , and . IEEE/ACM Trans. Netw., 14 (1): 133-146 (2006)Keynote: Performance, Availability and Security in Web Design.. ICWE, volume 3579 of Lecture Notes in Computer Science, page 3-4. Springer, (2005)Characterizing a spam traffic., , , , and . Internet Measurement Conference, page 356-369. ACM, (2004)Performance Analysis And Modeling Of A Windows NT Server., and . Int. CMG Conference, page 731-738. Computer Measurement Group, (1995)Locality of Reference in an Hierarchy of Web Caches., , , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 344-354. Springer, (2006)Fourth special track on Trust, Recommendations, Evidence and other Collaboration Know-how (TRECK'08): editorial message., and . SAC, page 1989. ACM, (2008)Challenges in Scaling e-Business Sites., and . Int. CMG Conference, page 329-336. Computer Measurement Group, (2000)"Like Sheep Among Wolves": Characterizing Hateful Users on Twitter., , , , and . CoRR, (2018)Characterizing the Public Perception of WhatsApp through the Lens of Media., , , , , and . CIKM Workshops, volume 2482 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Seller's credibility in electronic markets: a complex network based approach., , , and . WICOW, page 59-66. ACM, (2009)