Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recommending with an agenda: active learning of private attributes using matrix factorization., , , and . RecSys, page 65-72. ACM, (2014)PNP: Fast Path Ensemble Method for Movie Design., , , , , , and . KDD, page 1527-1536. ACM, (2017)On the Applicability of Peer-to-peer Data in Music Information Retrieval Research., , , and . ISMIR, page 273-278. International Society for Music Information Retrieval, (2010)Quantifying the Importance of Vantage Point Distribution in Internet Topology Mapping (Extended Version)., and . IEEE J. Sel. Areas Commun., 29 (9): 1837-1847 (2011)Estimating peer similarity using distance of shared files., , and . IPTPS, page 4. USENIX, (2010)AdReveal: improving transparency into online targeted advertising., , , , and . HotNets, page 12:1-12:7. ACM, (2013)Peer-to-peer information retrieval using shared-content clustering., , , and . Knowl. Inf. Syst., 39 (2): 383-408 (2014)A framework for extracting musical similarities from peer-to-peer networks., , , , and . ICME, page 1433-1438. IEEE Computer Society, (2010)Inferring traffic shaping and policy parameters using end host measurements., , and . INFOCOM, page 151-155. IEEE, (2011)Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks., , and . WWW, page 1287-1297. ACM / IW3C2, (2020)