Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network monitors and contracting systems: competition and innovation., and . SIGCOMM, page 183-194. ACM, (2006)Evaluating Information Visualization via the Interplay of Heuristic Evaluation and Question-Based Scoring., , and . CHI, page 5028-5033. ACM, (2016)Innovations and Upgrades in Virtualized Network Architectures., and . NetEcon, page 6:1-6:11. USENIX Association, (2010)Privacy and Policy in Polystores: A Data Management Research Agenda., , and . Poly/DMAH@VLDB, volume 11721 of Lecture Notes in Computer Science, page 68-81. Springer, (2019)Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You., , , , and . WEIS, (2015)Privacy, Polarization, and Passage of Divisive Laws., and . PAC, page 1-9. IEEE, (2018)An Evaluation of Semantically Grouped Word Cloud Designs., , , , , and . IEEE Trans. Vis. Comput. Graph., 26 (9): 2748-2761 (2020)Differential Privacy for Black-Box Statistical Analyses., and . Proc. Priv. Enhancing Technol., 2023 (3): 418-431 (July 2023)User-directed routing: from theory, towards practice., , and . NetEcon, page 1-6. ACM, (2008)Epsilon Voting: Mechanism Design for Parameter Selection in Differential Privacy., and . PAC, page 19-30. IEEE, (2018)