Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably Secure Steganography., , and . IEEE Trans. Computers, 58 (5): 662-676 (2009)Collective Intelligence 2012: Proceedings, and . CoRR, (2012)Improving accessibility of the web with a computer games, , , , and . CHI, page 79-82. ACM, (2006)TagATune: A Game for Music and Sound Annotation., , , and . ISMIR, page 361-364. Austrian Computer Society, (2007)CAPTCHA: Using Hard AI Problems for Security., , , and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 294-311. Springer, (2003)Public-Key Steganography., and . EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, page 323-341. Springer, (2004)Duolingo: learn a language for free while helping to translate the web.. IUI, page 1-2. ACM, (2013)Human Computation.. ICDE, page 1-2. IEEE Computer Society, (2008)Human Computation. School of Computer Science, Carnegie Mellon University, (2005)Human Computation, and . Synthesis Lectures on Artificial Intelligence and Machine Learning Morgan & Claypool Publishers, (2011)