Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Facilitating content creation and content research in building the city of lit digital library., , , , , , , and . JCDL, page 145-148. ACM, (2011)UCOL -- Iowa City UNESCO City of Literature: mobile application research & development., , , , , , , , , and . iConference, page 636-637. ACM, (2011)A targeted web crawling for building malicious javascript collection., and . CIKM-DSMM, page 23-26. ACM, (2009)The Iowa City UNESCO City of literature digital library., , , , , , , and . JCDL, page 477-478. ACM, (2011)B-APT: Bayesian Anti-Phishing Toolbar., , , , and . ICC, page 1745-1749. IEEE, (2008)Indexing Public-Private Graphs., , , and . WWW, page 1461-1470. ACM, (2017)BayeShield: conversational anti-phishing user interface., , , and . SOUPS, ACM, (2009)Exquisite Corpse 2.0: qualitative analysis of a community-based fiction project., and . Conference on Designing Interactive Systems, page 564-567. ACM, (2012)Introverted elves & conscientious gnomes: the expression of personality in world of warcraft., , , and . CHI, page 753-762. ACM, (2011)Identifying users with application-specific command streams., , , and . PST, page 232-238. IEEE Computer Society, (2014)