Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incentive Compatible Distributed Data Mining., and . SocialCom/PASSAT, page 735-742. IEEE Computer Society, (2010)First Steps Towards Predicting the Readability of Programming Error Messages., , , , , , and . SIGCSE (1), page 549-555. ACM, (2023)Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing., and . GameSec, volume 7638 of Lecture Notes in Computer Science, page 296-308. Springer, (2012)Trust management for cheating detection in distributed massively multiplayer online games., , and . NetGames, page 40-42. IEEE, (2017)Incentive Compatible Privacy-Preserving Distributed Classification., and . IEEE Trans. Dependable Secur. Comput., 9 (4): 451-462 (2012)Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data., , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 129-144. Springer, (2012)Efficient Query Verification on Outsourced Data: A Game-Theoretic Approach, and . CoRR, (2012)A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks., , and . IRI, page 37-44. IEEE, (2012)Towards Assessing the Readability of Programming Error Messages., , , , , and . ACE, page 181-188. ACM, (2021)An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining., , and . PAKDD, volume 5476 of Lecture Notes in Computer Science, page 515-524. Springer, (2009)