Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TIFTI: A Framework for Extracting Drug Intervals from Longitudinal Clinic Notes., , , and . CoRR, (2018)Algorithmic Approaches to Detecting Interviewer Fabrication in Surveys.. University of Washington, USA, (2012)Automated quality control for mobile data collection., , , and . ACM DEV, page 1:1-1:10. ACM, (2012)On Revenue Maximization in Second-Price Ad Auctions., , , and . ESA, volume 5757 of Lecture Notes in Computer Science, page 155-166. Springer, (2009)Achieving Flexibility in Direct-Manipulation Programming Environments by Relaxing the Edit-Time Grammar., and . VL/HCC, page 259-266. IEEE Computer Society, (2005)An Improved Analysis for a Greedy Remote-Clique Algorithm Using Factor-Revealing LPs., and . APPROX-RANDOM, volume 4110 of Lecture Notes in Computer Science, page 49-60. Springer, (2006)Convergence of Local Dynamics to Balanced Outcomes in Exchange Networks., , , , and . FOCS, page 293-302. IEEE Computer Society, (2009)Thinking Twice about Second-Price Ad Auctions, , , and . CoRR, (2008)Improved Approximation Algorithms for Budgeted Allocations., , , , and . ICALP (1), volume 5125 of Lecture Notes in Computer Science, page 186-197. Springer, (2008)Using behavioral data to identify interviewer fabrication in surveys., , , , and . CHI, page 2911-2920. ACM, (2013)