Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modern tech can't shield your secret identity.. Commun. ACM, 65 (5): 24-25 (2022)A Practical Network Layout Planning System Using GeoSpatial Data., , , , , and . Spatial Gems (1) (1), volume 46 of ACM Books, ACM, (2022)SWAMI (poster session): a framework for collaborative filtering algorithm development and evaluation, , , , , and . Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval, page 366--368. ACM Press, (2000)The use of Java as an introductory programming language.. XRDS, 4 (4): 8-13 (1998)The trouble with Facebook.. Commun. ACM, 65 (2): 8-9 (2022)What is that Building?: An End-to-end System for Building Recognition from Streetside Images., , , , , and . KDD, page 2425-2433. ACM, (2020)Privacy patterns for online interactions, , , , and . Proceedings of the 2006 conference on Pattern languages of programs, page 1--9. Portland, Oregon, ACM, (2006)The Design of Sites: Patterns, Principles, and Processes for Crafting a Customer-centered Web Experience, , and . Addison-Wesley Professional, (2002)Educated guess on graphical authentication schemes: vulnerabilities and countermeasures., , and . SOUPS, ACM, (2009)What's New in the Ubicomp Community?, and . IEEE Pervasive Comput., 12 (1): 5-7 (2013)