Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Social Applications via Decentralized Social Data Management, , , and . CoRR, (2012)Leveraging Peer Centrality in the Design of Socially-Informed Peer-to-Peer Systems, and . CoRR, (2012)Large-Scale Learning from Data Streams with Apache SAMOA., , and . CoRR, (2018)The Minimum Wiener Connector., , , , and . CoRR, (2015)The Social Hourglass: An Infrastructure for Socially Aware Applications and Services., , and . IEEE Internet Comput., 16 (3): 13-23 (2012)On the Aggression Diffusion Modeling and Minimization in Online Social Networks., , and . CoRR, (2020)If you are not paying for it, you are the product: how much do advertisers pay to reach you?, , , and . Internet Measurement Conference, page 142-156. ACM, (2017)Detecting Cyberbullying and Cyberaggression in Social Media., , , , , , and . ACM Trans. Web, 13 (3): 17:1-17:51 (2019)Stock trade volume prediction with Yahoo Finance user browsing behavior., , , and . ICDE, page 1168-1173. IEEE Computer Society, (2014)Privacy-Preserving Online Content Moderation: A Federated Learning Use Case., , , and . CoRR, (2022)