Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel multi-objective multi-robot coalition formation, , , , and . Expert Systems with Applications, 42 (21): 7797--7811 (November 2015)Rivulet: a fault-tolerant platform for smart-home applications., , , , and . Middleware, page 41-54. ACM, (2017)MPC-Friendly Commitments for Publicly Verifiable Covert Security., , , and . CCS, page 2685-2704. ACM, (2021)Conducting Morality and Emotion Analysis on Blog Discourse., , , and . CollabTech, volume 14199 of Lecture Notes in Computer Science, page 185-192. Springer, (2023)Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation., , , , and . CHI, page 68:1-68:13. ACM, (2021)Deconstructing Commodity Storage Clusters., , , , and . ISCA, page 60-71. IEEE Computer Society, (2005)Low-Latency Analytics on Colossal Data Streams with SummaryStore., and . SOSP, page 647-664. ACM, (2017)An efficient fusion strategy for multimodal biometric system., , , and . VISAPP (2), page 178-183. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2007)Hierarchical Delay Test Generation., , and . J. Electron. Test., 10 (3): 231-244 (1997)Libertas: Privacy-Preserving Computation for Decentralised Personal Data Stores., , , , , , , , and . CoRR, (2023)